A Survey on Group Key Management Schemes
暂无分享,去创建一个
[1] Yiling Wang,et al. Efficient Key Management for Secure Wireless Multicast , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[2] Tony Ballardie,et al. Core Based Trees (CBT version 2) Multicast Routing - Protocol Specification - , 1997, RFC.
[3] Hongke Zhang,et al. Multicast Extension Support for Proxy MIPv6 , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[4] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[5] Akihiro Shimizu,et al. Simple And Secure password authentication protocol, ver.2(SAS-2) (メディア工学) , 2002 .
[6] Miss Laiha Mat Kiah,et al. An Implementation of Secure Group Communication in a Wireless Environment , 2012 .
[7] Yacine Challal,et al. Adaptive Group Key Management Protocol for Wireless Communications , 2012, J. Univers. Comput. Sci..
[8] Jeng-Farn Lee,et al. MKMS: Multicast key management scheme for Proxy Mobile IPv6 networks , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).
[9] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[10] Yong Cheng,et al. HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast , 2007, 2007 International Conference on Networking, Architecture, and Storage (NAS 2007).
[11] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[12] David Hutchison,et al. Hydra: a decentralised group key management , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[13] Miss Laiha Mat Kiah,et al. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).
[14] Reham Abdellatif Abouhogail,et al. Security Assessment for Key Management in Mobile Ad Hoc Networks , 2014 .
[15] Yiling Wang,et al. Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[16] L. Dondeti,et al. A Distributed Group Key Management Scheme for Secure Many-to-many Communication , 1999 .
[17] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[18] Elina Eidkhani,et al. A New Group Key Management Protocol Using Code for Key Calculation: CKC , 2010, 2010 International Conference on Information Science and Applications.
[19] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[20] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[21] Colin Boyd,et al. On Key Agreement and Conference Key Agreement , 1997, ACISP.
[22] Alireza Nemaney Pour,et al. CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement , 2012, ArXiv.
[23] Ashok Samal,et al. Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..
[24] Yacine Challal,et al. Key management with host mobility in dynamic groups , 2010, SIN.
[25] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[26] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[27] T. Hardjono,et al. Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[28] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[29] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[30] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[31] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[32] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[33] K. J. Ray Liu,et al. Topology-aware key management schemes for wireless multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[34] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[35] Trust T. Mapoka,et al. Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .
[36] Xiulin Hu,et al. A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.
[37] Matu-Tarow Noda,et al. Simple and Secure Password Authentication Protocol (SAS) , 2000 .
[38] Ashok Samal,et al. Comparison of Hierarchical Key Distribution Schemes , 1999 .
[39] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[40] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[41] Danny Dolev,et al. Optimized Group Rekey for Group Communications Systems , 1999 .
[42] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.
[43] Gene Tsudik,et al. Communication-Efficient Group Key Agreement , 2001, SEC.
[44] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[45] Akshai Aggarwal,et al. A key management and secure routing integrated framework for Mobile Ad-hoc Networks , 2013, Ad Hoc Networks.
[46] K. J. Ray Liu,et al. An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[47] Bob Briscoe. MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences , 1999 .
[48] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[49] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[50] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[51] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.