... related work in Section 2.InSection 3, we present oursolution and give its detailed algorithms. Section 4 is devotedto an analysis and a simulation of the proposed solution.Section 5 concludes ... networks,” in Proceedings of the 9th ACMConference on Computer and Communications Security, pp. 41–47, November 2002.[15] D. Liu, P. Ning, and L. I. Rongfang, “Establishing pairwisekeys in distributed ... Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamicconferences,” in Proceedings of the 12th Annual InternationalCryptology Conference on Advances in Cryptology, pp. 471–486,Spring,...