1 "http://grouper.ieee.org/groups/802/11/Reports/tgs_ update.htm"
2 L. Lazos, "VP3: using vertex path and power proximity for energy efficient key distribution" 1228-1232, 2004
3 M. M. Zonoozi, "User mobility modeling and characterization of mobility patterns" 15 : 1239-1252, 1997
4 Y. Sun, "Topology-aware key management schemes for wireless multicast" 1471-1475, 2003
5 Y. Kim, "Simple and fault-tolerant key agreement for dynamic collaborative groups" 235-241, 2000
6 C. Wong, "Secure group communications using key graphs" 8 : 16-30, 2000
7 A. Hayter, "Probabiliby and statistics for engineers and scientists" Thomson Brooks/Cole 2007
8 L. Lazos, "Power proximity based key management for secure multicast in ad hoc networks" 13 (13): 127-148, 2007
9 R. Canetti, "Multicast security: A taxonomy and some efficient constructions" 708-716, 1999
10 Y. Vardi, "Metrics useful in network tomography studies" 11 (11): 353-355, 2004
1 "http://grouper.ieee.org/groups/802/11/Reports/tgs_ update.htm"
2 L. Lazos, "VP3: using vertex path and power proximity for energy efficient key distribution" 1228-1232, 2004
3 M. M. Zonoozi, "User mobility modeling and characterization of mobility patterns" 15 : 1239-1252, 1997
4 Y. Sun, "Topology-aware key management schemes for wireless multicast" 1471-1475, 2003
5 Y. Kim, "Simple and fault-tolerant key agreement for dynamic collaborative groups" 235-241, 2000
6 C. Wong, "Secure group communications using key graphs" 8 : 16-30, 2000
7 A. Hayter, "Probabiliby and statistics for engineers and scientists" Thomson Brooks/Cole 2007
8 L. Lazos, "Power proximity based key management for secure multicast in ad hoc networks" 13 (13): 127-148, 2007
9 R. Canetti, "Multicast security: A taxonomy and some efficient constructions" 708-716, 1999
10 Y. Vardi, "Metrics useful in network tomography studies" 11 (11): 353-355, 2004
11 D. Wallner, "Key management for multicast: issues and architectures" 1998
12 D. Balenson, "Key management for large dynamic groups: One-way function trees and amortized initialization" 2000
13 W. Trappe, "Key management and distribution for secure multimedia multicast" 5 (5): 544-557, 2003
14 Y. Sun, "Hierarchical group access control for secure multicast communications" 15 (15): 1514-1526, 2007
15 L. Lazos, "Energy-aware secure multicast communication in ad-hoc networks using geographical location information" 201-204, 2003
16 J. Salido, "Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach" 12 : 653-666, 2004
17 D. R. Stinson, "Cryptography - Theory and Practice" Chapman & Hall/CRC 2006
18 L. Lazos, "Cross-layer design for energy-efficient secure multicast communications in ad hoc networks" 3633-3639, 2004
19 Y. Sun, "An efficient ke management scheme for secure wireless multicast" 1236-1240, 2002
20 Y. Sun, "A scalable multicast key management scheme for heterogeneous wireless networks" 12 : 653-666, 2004
21 J. Robinson, "A performance study of deployment factors in wireless mesh networks" 2054-2062, 2007