Packet construction for secure conference call request in ad hoc network systems, Information Sciences, vol.177, issue.24, pp.5598-5610, 2007. ,
DOI : 10.1016/j.ins.2007.05.026
Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy, Security and Communication Networks, pp.100-107, 2013. ,
DOI : 10.1002/sec.536
A secure e-mail protocol using ID-based FNS multicast mechanism, Computer Science and Information Systems, vol.11, issue.3, pp.1091-1112, 2014. ,
DOI : 10.2298/CSIS130924066C
URL : http://doi.org/10.2298/csis130924066c
On Key Distribution in Secure Multicasting, Proceedings of 25th Annual IEEE International Conference on Local Computer Networks, p.208, 2000. ,
Group key agreement efficient in communication, IEEE Transactions on Computers, vol.53, issue.7, pp.905-921, 2001. ,
DOI : 10.1109/TC.2004.31
Tree-based group key agreement, ACM Transactions on Information and System Security, vol.7, issue.1, pp.60-96, 2004. ,
DOI : 10.1145/984334.984337
Specifying and using a partitionable group communication service, ACM Transactions on Computer Systems, vol.19, issue.2, pp.171-216, 2001. ,
DOI : 10.1145/377769.377776
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.1012
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.55-75, 2013. ,
Securing a Space-Based Service Architecture with Coordination-Driven Access Control, Journal of Wireless Mobile Networks , Ubiquitous Computing, and Dependable Applications (JoWUA), pp.76-97, 2013. ,
Privacy Enhancing Factors in People-Nearby Applications, Ubiquitous Computing, and Dependable Applications (JoWUA), pp.113-121, 2015. ,
Differentiating User Authentication Graphs, 2013 IEEE Security and Privacy Workshops, pp.24-38, 2014. ,
DOI : 10.1109/SPW.2013.38
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.678.6267
Extended virtual synchrony, 14th International Conference on Distributed Computing Systems, pp.55-65, 1994. ,
DOI : 10.1109/ICDCS.1994.302392
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.8617
A Novel Elliptic Curve Method for Secure Multicast System, Far East Journal of Mathematical Sciences, vol.28, issue.2, pp.449-467, 2008. ,
Hierarchical Access Control Using the Secure Filter, IEICE Transaction On Information & System, issue.6, pp.700-708, 2001. ,