메뉴 건너뛰기




Volumn 13, Issue 1, 2005, Pages 134-146

Resource-aware conference key establishment for heterogeneous networks

Author keywords

Conference key agreement; Diffie Hellman; Huffman algorithm

Indexed keywords

ALGORITHMS; COMPUTER SIMULATION; OPTIMIZATION; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 15544371460     PISSN: 10636692     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNET.2004.842236     Document Type: Article
Times cited : (27)

References (33)
  • 1
    • 0033356116 scopus 로고    scopus 로고
    • "A survey of security issues in multicast communications"
    • Nov.-Dec
    • M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol. 13, no. 6, pp. 12-23, Nov.-Dec. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 3
    • 0033893174 scopus 로고    scopus 로고
    • "Secure group communications using key graphs"
    • Feb
    • C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 4
    • 0004135561 scopus 로고    scopus 로고
    • "Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization"
    • Internet Draft Report
    • D. Balenson, D. McGrew, and A. Sherman, "Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization," Internet Draft Report.
    • Balenson, D.1    McGrew, D.2    Sherman, A.3
  • 7
    • 0000205020 scopus 로고    scopus 로고
    • "Efficient communication-storage tradeoffs for multicast encryption"
    • R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption," Eurocrypt, pp. 456-470, 1999.
    • (1999) Eurocrypt , pp. 456-470
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 9
    • 0017018484 scopus 로고
    • "New directions in cryptography"
    • Nov
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 10
    • 0020180459 scopus 로고
    • "A conference key distribution system"
    • Sep
    • I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. Inform. Theory, vol. 28, no. 5, pp. 714-720, Sep. 1982.
    • (1982) IEEE Trans. Inform. Theory , vol.28 , Issue.5 , pp. 714-720
    • Ingemarsson, I.1    Tang, D.2    Wong, C.3
  • 11
    • 0000288916 scopus 로고
    • "A secure and efficient conference key distribution scheme"
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution scheme," Advances in Cryptology - Eurocrypt, pp. 275-286, 1994.
    • (1994) Advances in Cryptology - Eurocrypt , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 14
    • 0033748607 scopus 로고    scopus 로고
    • "New multiparty authentication services and key agreement protocols"
    • Apr
    • G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE J. Select. Areas Commun. vol. 18, no. 4, pp. 628-639, Apr. 2000.
    • (2000) IEEE J. Select. Areas Commun. , vol.18 , Issue.4 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 15
    • 85015402934 scopus 로고
    • "Use of elliptic curves in cryptography"
    • V. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology: Crypto '85, 1986, pp. 417-426.
    • (1986) Advances in Cryptology: Crypto '85 , pp. 417-426
    • Miller, V.1
  • 18
    • 15544383603 scopus 로고    scopus 로고
    • "Group key agreement using divide-and-conquer strategies"
    • presented at the The John's Hopkins University Conf. Information Sciences and Systems, Mar
    • W. Trappe, Y. Wang, and K. J. R. Liu, "Group key agreement using divide-and-conquer strategies," presented at the The John's Hopkins University Conf. Information Sciences and Systems, Mar. 2001.
    • (2001)
    • Trappe, W.1    Wang, Y.2    Liu, K.J.R.3
  • 20
    • 15544386715 scopus 로고
    • Discrete-Time Signal Processing. Englewood Cliffs, NJ: Prentice-Hall
    • A. Oppenheim and R. Schafer, Discrete-Time Signal Processing. Englewood Cliffs, NJ: Prentice-Hall, 1989.
    • (1989)
    • Oppenheim, A.1    Schafer, R.2
  • 21
    • 0036738266 scopus 로고    scopus 로고
    • "SPINS: Security protocols for sensor networks"
    • A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
    • (2002) Wireless Networks , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, D.3    Wen, V.4    Culler, D.5
  • 23
    • 84938015047 scopus 로고
    • "A method for the construction of minimum redundancy codes"
    • D. Huffman, "A method for the construction of minimum redundancy codes," in Proc. Inst. Radio Eng., vol. 40, 1952, pp. 1098-1101.
    • (1952) Proc. Inst. Radio Eng. , vol.40 , pp. 1098-1101
    • Huffman, D.1
  • 24
    • 0006718744 scopus 로고
    • "Practical length-limited coding for large alphabets"
    • A. Turping and A. Moffat, "Practical length-limited coding for large alphabets," Computer J., vol. 38, pp. 339-347, 1995.
    • (1995) Computer J. , vol.38 , pp. 339-347
    • Turping, A.1    Moffat, A.2
  • 25
    • 0025464931 scopus 로고
    • "A fast algorithm for optimal length-limited Huffman codes"
    • Jul
    • L. Larmore and D. Hirschberg, "A fast algorithm for optimal length-limited Huffman codes," J. ACM, vol. 37, pp. 464-473, Jul. 1990.
    • (1990) J. ACM , vol.37 , pp. 464-473
    • Larmore, L.1    Hirschberg, D.2
  • 26
    • 0035183635 scopus 로고    scopus 로고
    • "The warm-up algorithm: A Lagrangian construction of length restricted Huffman codes"
    • R. Milidiu and E. Laber, "The warm-up algorithm: a Lagrangian construction of length restricted Huffman codes," SIAM J. Computation, vol. 30, pp. 1405-1426, 2000.
    • (2000) SIAM J. Computation , vol.30 , pp. 1405-1426
    • Milidiu, R.1    Laber, E.2
  • 27
    • 0000588430 scopus 로고
    • "Discrete optimization via marginal analysis"
    • B. Fox, "Discrete optimization via marginal analysis," Manage. Sci. vol. 13, pp. 210-216, 1966.
    • (1966) Manage. Sci. , vol.13 , pp. 210-216
    • Fox, B.1
  • 29
    • 0036286367 scopus 로고    scopus 로고
    • "A time-efficient contributory key agreement scheme for secure group communication"
    • B. Sun, W. Trappe, Y. Sun, and K. J. R. Liu, "A time-efficient contributory key agreement scheme for secure group communication," in Proc. IEEE Int. Conf. Communications, vol. 2, 2002, pp. 1159-1163.
    • (2002) Proc. IEEE Int. Conf. Communications , vol.2 , pp. 1159-1163
    • Sun, B.1    Trappe, W.2    Sun, Y.3    Liu, K.J.R.4
  • 31
    • 0019183461 scopus 로고
    • "On the word-length of Huffman codes"
    • T. Nemetz, "On the word-length of Huffman codes," Probl. Contr. Inform. Theory, vol. 9, pp. 231-242, 1980.
    • (1980) Probl. Contr. Inform. Theory , vol.9 , pp. 231-242
    • Nemetz, T.1
  • 32
    • 0015066917 scopus 로고
    • "Codes based on inaccurate source probabilities"
    • May
    • E. Gilbert, "Codes based on inaccurate source probabilities," IEEE Trans. Inform. Theory, vol. 17, no. 3, pp. 304-314, May 1971.
    • (1971) IEEE Trans. Inform. Theory , vol.17 , Issue.3 , pp. 304-314
    • Gilbert, E.1
  • 33
    • 0003216056 scopus 로고    scopus 로고
    • "Tunstall adaptive coding and miscoding"
    • Nov
    • F. Fabris, A. Sgarro, and R. Pauletti, "Tunstall adaptive coding and miscoding," IEEE Trans. Inform. Theory, vol. 42, no. 6, pp. 2167-2180, Nov. 1996.
    • (1996) IEEE Trans. Inform. Theory , vol.42 , Issue.6 , pp. 2167-2180
    • Fabris, F.1    Sgarro, A.2    Pauletti, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.