نتایج جستجو برای: key group method

تعداد نتایج: 2918918  

Journal: :Wireless Personal Communications 2015
Hua Guo Yandong Zheng

Recently, in Journal of Security and Communication Networks (5(12):1363-1374, DOI: 10.1002/ sec.429), Wang et al. proposed a group key distribution scheme with self-healing property for wireless networks in which resource is constrained. They claimed that their key distribution scheme satisfies forward security, backward security and can resist collusion attack. Unfortunately, we found some sec...

Journal: :IACR Cryptology ePrint Archive 2004
Ratna Dutta Rana Barua Palash Sarkar

2009
Yacine Challal Abdelmadjid Bouabdallah Hamida Seba

Group key management is an important functional building block for any secure multicast architecture. Thereby, it has been extensively studied in the literature. In this paper we present relevant group key management protocols. Then, we compare them against some pertinent performance criteria. Keywords—Multicast, Security, Group Key Management.

2018
Chris J Mitchell

Major shortcomings in a recently published group key establishment protocol are described. These shortcomings are sufficiently serious that the protocol should not be used.

Journal: :ICST Trans. Mobile Communications Applications 2015
Trust Tshepo Mapoka Simon J. Shepherd Yousif A. Dama Haider M. AlSabbagh Raed A. Abd-Alhameed

Corresponding author. Email: [email protected]

2008
Rakesh Chandra Gangwar

Now-a-days Internet has become the common media of communication. Many group communication application such as pay-per-view, stock quote distribution, voiceand video-conferencing, white-boards, distributed simulations, and replicated servers of all types, etc can easily be conducted on the Internet. For conducting such applications, group key is often needed, which can be established by group k...

Journal: :I. J. Network Security 2016
Depeng Li Srinivas Sampalli

Contributory group key management schemes are popularly used for dynamic peer group communications in collaborative environments. Previous contributory group key management schemes require every group member to perform a number of expensive Diffie-Hellman operations whenever the group membership changes. This is not always affordable for devices in resource-constrained networks. In this paper, ...

Journal: :JCM 2008
Li Xu Jianwei Chen Xiaoding Wang

Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly used to construct orthogonal arrays in order to obtain t-packing designs quickly. Based on cover-free family properties, t-packing designs are adopted in key predistribution phase. Then based secure key-shared method, the pre-d...

Journal: :JNW 2012
Qiuhua Wang Huifang Chen Lei Xie Kuang Wang

The self-healing group key distribution with revocation can deal with the session key distribution problem for secure group communication over an unreliable wireless network, with the capability of resistance to the packet loss and the collusion attack. However, since previous self-healing group key distribution schemes are restricted to m sessions, they will be reset frequently, which leads to...

2005
Himanshu Khurana Rafael Bonilla Adam J. Slagell Raja Afandi Hyung-Seok Hahm Jim Basney

Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed and of these the most efficient and scalable ones are based on logical key hierarchies (LKH) with symmetric keys organized in a tree. However, these solutions centralize trust in the group controller and make it an attractive a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید