High Performance Group Merging/Splitting Scheme for Group Key Management

[1]  Baocang Wang,et al.  Group key agreement for secure group communication in dynamic peer systems , 2012, J. Parallel Distributed Comput..

[2]  Stephen B. Wicker,et al.  On the Rekeying Load in Group Key Distributions Using Cover-Free Families , 2012, IEEE Transactions on Information Theory.

[3]  Pang Liao,et al.  A Public Key Encryption Scheme with One-Encryption and Multi-Decryption , 2012 .

[4]  Jingsha He,et al.  Distributed Group Key Management in Wireless Mesh Networks , 2012 .

[5]  Michele Nogueira Lima,et al.  Survivable key management on WANETs , 2011, IEEE Wireless Communications.

[6]  Josep Domingo-Ferrer,et al.  Asymmetric group key agreement protocol for open networks and its application to broadcast encryption , 2011, Comput. Networks.

[7]  Philip Samuel,et al.  A Predictive Clustering Technique for Effective Key Management in Mobile Ad Hoc Networks , 2011, Inf. Secur. J. A Glob. Perspect..

[8]  Sandeep S. Kulkarni,et al.  Key-update distribution in secure group communication , 2010, Comput. Commun..

[9]  Seung-Woo Seo,et al.  Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..

[10]  Yi Mu,et al.  Asymmetric Group Key Agreement , 2009, EUROCRYPT.

[11]  Ronggong Song,et al.  A Scalable Group Key Management Protocol , 2008, IEEE Communications Letters.

[12]  Deep Medhi,et al.  A secure group key management scheme for hierarchical mobile ad hoc networks , 2008, Ad Hoc Networks.

[13]  JongWon Kim,et al.  An efficient LKH tree balancing algorithm for group key management , 2006, IEEE Communications Letters.

[14]  Ratna Dutta,et al.  Overview of Key Agreement Protocols , 2005, IACR Cryptol. ePrint Arch..

[15]  Sang-Ho Lee,et al.  A Group Key Management Scheme Using Core Based Tree and Height Balanced Tree , 2004, IEICE Trans. Inf. Syst..

[16]  Gene Tsudik,et al.  Tree-based group key agreement , 2004, TSEC.

[17]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[18]  Özgür B. Akan,et al.  Performance of TCP protocols in deep space communication networks , 2002, IEEE Communications Letters.

[19]  Kwangjo Kim,et al.  A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem , 2002, ACISP.

[20]  Kaoru Kurosawa,et al.  Multi-recipient Public-Key Encryption with Shortened Ciphertext , 2002, Public Key Cryptography.

[21]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[22]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[23]  Jacques Stern,et al.  Extended Notions of Security for Multicast Public Key Cryptosystems , 2000, ICALP.

[24]  Stephen M. Matyas,et al.  Decentralized group key management for secure multicast communications , 1999, Comput. Commun..

[25]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 1998, SIGCOMM '98.

[26]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[27]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.