DMCA

Monitoring-Based Key Revocation Schemes for Mobile Ad Hoc Networks: Design and Security Analysis

by Katrin Hoeper , Guang Gong B