Advanced Mathematics and Numerical Modeling of IoT

(lily) #1

[19] J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny, “Group manage-
ment for mobile Ad Hoc networks: design, implementation and
experiment,” inProceedings of the 6th International Conference
on Mobile Data Management (MDM ’05), pp. 192–199, Ayia
Napa, Cyprus, May 2005.
[20] B. Singh and D. K. Lobiyal, “A novel energy-aware cluster head
selection based on particle swarm optimization for wireless
sensor networks,”Human-Centric Computing and Information
Sciences,vol.2,no.13,pp.1–18,2012.
[21] C.-W. Chen, Y.-R. Tsai, and S.-J. Wang, “Cost-saving key agree-
ment via secret sharing in two-party communication systems,”
Journal of Convergence,vol.3,no.4,pp.29–36,2012.
[22] S. Mohanty and B. Majhi, “A strong designated verifiable dl
based signcryption scheme,”Journal of Information Processing
Systems,vol.8,no.4,pp.567–574,2012.


[23] M. Stevens, A. K. Lenstra, and B. de Weger, “Chosen-prefix
collisions for MD5 and applications,”International Journal of
Applied Cryptography,vol.2,no.4,pp.322–359,2012.

Free download pdf