Rotation based secure multicast key management for batch rekeying operations
暂无分享,去创建一个
[1] Arputharaj Kannan,et al. A Secure Key Distribution Protocol for Multicast Communication , 2011 .
[2] Haitham S. Cruickshank,et al. Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..
[3] Mark Allen Weiss,et al. Data structures and algorithm analysis in Ada , 1993 .
[4] Kishore Kothapalli,et al. Routing Protocol Security Using Symmetric Key Based Techniques , 2009, 2009 International Conference on Availability, Reliability and Security.
[5] Seung-Woo Seo,et al. Computation-and-storage-efficient key tree management protocol for secure multicast communications , 2010, Comput. Commun..
[6] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[7] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[8] K. J. Ray Liu,et al. Key management and distribution for secure multimedia multicast , 2003, IEEE Trans. Multim..
[9] David K. Y. Yau,et al. Distributed collaborative key agreement protocols for dynamic peer groups , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[10] Sandeep S. Kulkarni,et al. Balancing Revocation and Storage Trade-Offs in Secure Group Communication , 2011, IEEE Transactions on Dependable and Secure Computing.
[11] Francisco Rico-Novella,et al. Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[12] Sandeep S. Kulkarni,et al. Key-update distribution in secure group communication , 2010, Comput. Commun..
[13] Yang Richard Yang,et al. Protocol design for scalable and reliable group rekeying , 2001, TNET.
[14] Cheng Huang,et al. Computation-Efficient Multicast Key Distribution , 2008, IEEE Transactions on Parallel and Distributed Systems.
[15] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[16] Mahalingam Ramkumar. The Subset Keys and Identity Tickets (SKIT) Key Distribution Scheme , 2010, IEEE Transactions on Information Forensics and Security.
[17] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[18] Jin-Hee Cho,et al. On optimal batch rekeying for secure group communications in wireless networks , 2008, Wirel. Networks.
[19] Kishore Kothapalli,et al. A Family of Collusion Resistant Symmetric Key Protocols for Authentication , 2008, ICDCN.
[20] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[21] Kishore Kothapalli,et al. Reducing the Cost of Session Key Establishment , 2009, 2009 International Conference on Availability, Reliability and Security.
[22] Mark Allen Weiss,et al. Data structures and algorithm analysis , 1991 .
[23] S. Siva Subramanian,et al. An effective key distribution protocol for secure multicast communication , 2010, ICoAC 2010.
[24] Haitham S. Cruickshank,et al. Dynamic Balanced Key Tree Management for Secure Multicast Communications , 2007, IEEE Transactions on Computers.