Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges, Journal of Network and Computer Applications, vol.50, pp.50-51, 2015. ,
DOI : 10.1016/j.jnca.2014.11.001
Cognitive radio: making software radios more personal, IEEE Personal Communications, vol.6, issue.4, pp.13-18, 1999. ,
DOI : 10.1109/98.788210
Dynamic spectrum allocation (DSA) and reconfigurability, IEEE Communications Magazine, pp.72-81, 2004. ,
Cognitive radio communications and networks: principles and practice, 2009. ,
Mobile App Security Analysis with the MAVeriC Static Analysis Module, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, pp.103-119, 2014. ,
Design of categorization mechanism for disaster-information-gathering system, J Wirel Mob Netw Ubiquitous Comput Dependable Appl, vol.3, issue.4, pp.2012-2033 ,
Augmented Reality Enabled IoT Services for Environmental Monitoring Utilising Serious Gaming Concept, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.37-55, 2015. ,
Secure group communications over data networks, 2007. ,
Distributed collaborative key agreement and authentication protocols for dynamic peer Groups, IEEE/ACM Transactions on Networking, vol.14, issue.2, pp.263-276, 2006. ,
DOI : 10.1109/TNET.2006.872575
Simple and fault-tolerance key agreement for dynamic collaborative groups, 7th ACM Conference on Computer and Communications Security, pp.235-244, 2000. ,
DOI : 10.1145/352600.352638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.294.9154
New directions in cryptography. Information Theory, IEEE Transactions on, vol.22, issue.6, pp.644-654, 1976. ,
DOI : 10.1109/tit.1976.1055638
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.37.9720
Protocols for authentication and key establishment, 2003. ,
DOI : 10.1007/978-3-662-09527-0
Authenticating hard decision sensing reports in cognitive radio networks, Computer Networks, vol.56, issue.2, pp.566-576, 2012. ,
DOI : 10.1016/j.comnet.2011.10.006
Key establishment in large dynamic groups using one-way function trees. Software Engineering, IEEE Transactions on, vol.29, issue.5, pp.444-458, 2003. ,
DOI : 10.1109/tse.2003.1199073
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.47.2372
An effective key distribution protocol for secure multicast communication, ICoAC 2010, pp.102-107, 2010. ,
DOI : 10.1109/ICOAC.2010.5725367
Multicast Key Management Scheme Based on TOFT, 2008 10th IEEE International Conference on High Performance Computing and Communications, pp.1030-1035, 2008. ,
DOI : 10.1109/HPCC.2008.90
Efficient group key management protocol with one-way key derivation, IEEE Conference on Local Computer Networks, pp.336-343, 2005. ,
Improving scalability in vehicular communication using one-way hash chain method, Ad Hoc Networks, vol.11, issue.8, pp.2526-2540, 2013. ,
DOI : 10.1016/j.adhoc.2013.05.017
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy, Information Sciences, vol.269, pp.270-285, 2014. ,
DOI : 10.1016/j.ins.2013.10.022
An image-based key agreement protocol using the morphing technique. Multimedia Tools and Applications, pp.74-32073229, 2013. ,
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps, Information Sciences, vol.312, pp.312-104, 2015. ,
DOI : 10.1016/j.ins.2015.03.050
Secure distributed batch rekeying algorithm for dynamic group, Communication Technology (ICCT), 2012 IEEE 14th International Conference on, pp.664-667, 2012. ,
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, Fast Software Encryption, pp.371-388, 2004. ,
DOI : 10.1007/978-3-540-25937-4_24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.6200
EDKAS: A Efficient Distributed Key Agreement Scheme Using One Way Function Trees for Dynamic Collaborative Groups, The Proceedings of the Multiconference on "Computational Engineering in Systems Applications", pp.1215-1222, 2006. ,
DOI : 10.1109/CESA.2006.313506
Approximately optimal trees for group key management with batch updates, Theoretical Computer Science, issue.11, pp.410-1013, 2009. ,
DOI : 10.1016/j.tcs.2008.10.034
URL : http://doi.org/10.1016/j.tcs.2008.10.034