您当前的位置:
首页 >
文章列表页 >
On-demand key management based on social attribute for opportunistic networks
Papers | 更新时间:2024-06-05
    • On-demand key management based on social attribute for opportunistic networks

    • Journal on Communications   Vol. 33, Issue 12, Pages: 93-99(2012)
    • DOI:10.3969/j.issn.1000-436x.2012.12.012    

      CLC: TP393
    • Online First:2012-12

      Published:25 December 2012

    移动端阅览

  • Xi CHEN, Guang-song LI, You-liang TIAN, et al. On-demand key management based on social attribute for opportunistic networks[J]. Journal on Communications, 2012, 33(12): 93-99. DOI: 10.3969/j.issn.1000-436x.2012.12.012.

  •  
  •  

0

Views

627

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Efficient unpaired data validation and aggregation protocol in industrial Internet of things
Blockchain-based distributed EHR fine-grained traceability scheme
High-performance and high-concurrency encryption scheme for Hadoop platform
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Utility-based barter trade incentive scheme in opportunistic network

Related Author

FENG Tao
MA Rong
Ximeng LIU
Jianfeng MA
Yuanping SI
Zuobin YING
Fenghua LI
Wei JIN

Related Institution

School of Computer and Communication, Lanzhou University of Technology
School of Computer Science and Technology, Anhui University
School of Mathematics and Computer Science, Fuzhou University
School of Network and Information Security, Xidian University
Institutes of Physical and Information Technology, Anhui University
0