메뉴 건너뛰기




Volumn 2003-January, Issue , 2003, Pages 559-564

On rekey policies for secure group applications

Author keywords

Broadcast technology; Broadcasting; Communication system control; Costs; Cryptography; Data security; Internet; Large scale systems; Multimedia communication; Telecommunication traffic

Indexed keywords

BROADCASTING; COSTS; CRYPTOGRAPHY; INTERNET; LARGE SCALE SYSTEMS; MULTIMEDIA SYSTEMS; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 32644440201     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2003.1284224     Document Type: Conference Paper
Times cited : (7)

References (15)
  • 2
    • 3042591113 scopus 로고    scopus 로고
    • Group key management architecture
    • Mar. draft-ietfmsec-gkmarch-04. txt
    • M. Baugher, R. Canetti, L. Dondeti, and F. Lindholm, "Group key management architecture," INTERNET-DRAFT, Mar. 2003, draft-ietfmsec-gkmarch-04.txt.
    • (2003) INTERNET-DRAFT
    • Baugher, M.1    Canetti, R.2    Dondeti, L.3    Lindholm, F.4
  • 3
    • 0003657439 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • Sept.
    • D. Wallner, E. Jarder, and R. Agee, "Key management for multicast: Issues and architectures," INTERNET-DRAFT, Sept. 1998.
    • (1998) INTERNET-DRAFT
    • Wallner, D.1    Jarder, E.2    Agee, R.3
  • 4
    • 0003557429 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • Inc, Glenwood, MD, Technical Report No. 0755, May
    • D. A. McGrew and A. T. Sherman, "Key establishment in large dynamic groups using one-way function trees," TIS Labs at Network Associates, Inc, Glenwood, MD, Technical Report No. 0755, May 1998.
    • (1998) TIS Labs at Network Associates
    • McGrew, D.A.1    Sherman, A.T.2
  • 5
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • LNCS
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology-CRYPTO '01, LNCS, vol. 2139, pp. 41-62, 2001.
    • (2001) Advances in Cryptology-CRYPTO '01 , vol.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 6
    • 0034780938 scopus 로고    scopus 로고
    • Reliable group rekeying: A performance analysis
    • San Diego, California: ACM Press, Aug.
    • Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: a performance analysis," in Proceedings of the ACM SIGCOMM '01". San Diego, California: ACM Press, Aug. 2001, pp. 27-38.
    • (2001) Proceedings of the ACM SIGCOMM '01 , pp. 27-38
    • Yang, Y.R.1    Li, X.S.2    Zhang, X.B.3    Lam, S.S.4
  • 8
    • 0034238689 scopus 로고    scopus 로고
    • Key management for restricted multicast using broadcast encryption
    • August
    • M. Abdalla, Y. Shavitt, and A. Wool, "Key management for restricted multicast using broadcast encryption," IEEE/ACM Transactions on Networking (TON), vol. 8, no. 4, pp. 443-454, August 2000.
    • (2000) IEEE/ACM Transactions on Networking (TON) , vol.8 , Issue.4 , pp. 443-454
    • Abdalla, M.1    Shavitt, Y.2    Wool, A.3
  • 9
    • 84952354621 scopus 로고    scopus 로고
    • The multicast security (msec) architecture
    • Nov. draft-ietf-msec-arch-00. txt
    • T. Hardjono and B. Weis, "The multicast security (msec) architecture," INTERNET-DRAFT, Nov. 2002, draft-ietf-msec-arch-00.txt.
    • (2002) INTERNET-DRAFT
    • Hardjono, T.1    Weis, B.2
  • 14
    • 0033690786 scopus 로고    scopus 로고
    • Kronos: A scalable group rekeying approach for secure multicast
    • Berkeley, CA
    • S. J. S. Setia, S. Koussih and E. Harder, "Kronos: A scalable group rekeying approach for secure multicast," in IEEE Symposium on Security and Privacy, Berkeley, CA, 2000, pp. 215-228.
    • (2000) IEEE Symposium on Security and Privacy , pp. 215-228
    • Setia, S.J.S.1    Koussih, S.2    Harder, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.