A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications
暂无分享,去创建一个
[1] Rajendra Kumar,et al. Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups , 2020 .
[2] Bashir Alam,et al. Efficient and Secure Key Management for Conditional Access Systems , 2020, IEEE Transactions on Consumer Electronics.
[3] A. S. Anakath,et al. A novel RSA algorithm for secured key transmission in a centralized cloud environment , 2020, Int. J. Commun. Syst..
[4] Aravind Karrothu,et al. Group and hierarchical key management for secure communications in internet of things , 2020, Int. J. Commun. Syst..
[5] Rajendra Kumar,et al. A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem , 2020, J. King Saud Univ. Comput. Inf. Sci..
[6] Bashir Alam,et al. Key Management Scheme for Secure Group Communication , 2020 .
[7] Harmanpreet Singh Grover,et al. A secure authentication protocol for wearable devices environment using ECC , 2019, J. Inf. Secur. Appl..
[8] Lein Harn,et al. Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network (WSN) , 2019, Secur. Commun. Networks.
[9] Bashir Alam,et al. Efficient and secure conditional access system for pay-TV systems , 2019, Multimedia Tools and Applications.
[10] Amin Mesmoudi,et al. SKWN: Smart and dynamic key management scheme for wireless sensor networks , 2019, Int. J. Commun. Syst..
[11] Vinod Kumar,et al. An Efficient and Scalable Distributed Key Management Scheme Using Ternary Tree for Secure Communication in Dynamic Groups , 2020 .
[12] S. K. Pandey,et al. Fully Homomorphic Encryption Scheme with Probabilistic Encryption Based on Euler’s Theorem and Application in Cloud Computing , 2018 .
[13] Manik Lal Das,et al. Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks , 2017, Comput. Commun..
[14] Rajendra Kumar,et al. An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem , 2017 .
[15] Wen-Guey Tzeng,et al. Group key management with efficient rekey mechanism: A Semi-Stateful approach for out-of-Synchronized members , 2017, Comput. Commun..
[16] Hanumat G. Sastry,et al. Smart and Innovative Trends in Next Generation Computing Technologies , 2017, Communications in Computer and Information Science.
[17] Alwyn Roshan Pais,et al. A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network , 2015, ICDCIT.
[18] Chin-Chen Chang,et al. An authenticated group key distribution mechanism using theory of numbers , 2014, Int. J. Commun. Syst..
[19] Arputharaj Kannan,et al. Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..
[20] Xinyi Huang,et al. Provably Secure Group Key Management Approach Based upon Hyper-Sphere , 2014, IEEE Transactions on Parallel and Distributed Systems.
[21] V. Rhymend Uthariaraj,et al. Huffman based conditional access system for key distribution in digital TV multicast , 2013, Multimedia Tools and Applications.
[22] R. S. Bichkar,et al. Scalable Key Transport Protocol Using Chinese Remainder Theorem , 2013, SSCC.
[23] Arputharaj Kannan,et al. Centralized key distribution protocol using the greatest common divisor method , 2013, Comput. Math. Appl..
[24] Chin-Chen Chang,et al. A Construction for Secret Sharing Scheme with General Access Structure , 2013, J. Inf. Hiding Multim. Signal Process..
[25] K. Saravanan,et al. Efficient Star Topology based Multicast Key Management Algorithm , 2012 .
[26] Andrés Ortiz,et al. Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean Algorithm , 2011, CISIS.
[27] Iuon-Chang Lin,et al. Multicast Key Management without Rekeying Processes , 2010, Comput. J..
[28] Chin-Chen Chang,et al. A novel key management scheme for dynamic multicast communications , 2009, Int. J. Commun. Syst..
[29] Chin-Tser Huang,et al. Chinese remainder theorem based group key management , 2007, ACM-SE 45.
[30] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[31] Haibin Lu,et al. A novel high-order tree for secure multicast key management , 2005, IEEE Transactions on Computers.
[32] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[33] Richard E. Ladner,et al. Algorithms for dynamic multicast key distribution trees , 2003, PODC '03.
[34] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[35] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[36] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[37] Pankaj Rohatgi,et al. Maintaining Balanced Key Trees for Secure Multicast , 1999 .