메뉴 건너뛰기




Volumn 2, Issue 2, 2006, Pages 187-203

Scalable key management for secure multicast communication in the mobile environment

Author keywords

Key derivation; Key management; Mobile Internet; Multicast communication

Indexed keywords

CRYPTOGRAPHY; HIERARCHICAL SYSTEMS; INTERNET; MULTICASTING; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 32644441025     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2005.11.003     Document Type: Article
Times cited : (20)

References (22)
  • 1
    • 0038318458 scopus 로고    scopus 로고
    • Logical key hierarchy protocol
    • draft-harney-sparta-lkhp-sec-00.txt
    • H. Harney, E. Harder, Logical key hierarchy protocol, Internet draft, draft-harney-sparta-lkhp-sec-00.txt, 1999
    • (1999) Internet Draft
    • Harney, H.1    Harder, E.2
  • 3
    • 1642361005 scopus 로고    scopus 로고
    • Key management for large dynamic groups: One-way function trees and amortized initialization
    • draft-balenson-groupkeymgmt-oft-00.txt
    • D. Balenson, D. McGrew, A. Sherman, Key management for large dynamic groups: one-way function trees and amortized initialization, Internet draft, draft-balenson-groupkeymgmt-oft-00.txt, 1999
    • (1999) Internet Draft
    • Balenson, D.1    McGrew, D.2    Sherman, A.3
  • 6
    • 84957623200 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • Advances in Cryptology EUROCRYPT'99 Springer-Verlag
    • R. Canetti, T. Malkin, K. Nissim, Efficient communication-storage tradeoffs for multicast encryption, in: Advances in Cryptology EUROCRYPT'99, in: LNCS, vol. 1599, Springer-Verlag, pp. 459-474
    • LNCS , vol.1599 , pp. 459-474
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 8
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra Iolus: a framework for scalable secure multicasting ACM Computer Communication Review 27 4 1997 227 288
    • (1997) ACM Computer Communication Review , vol.27 , Issue.4 , pp. 227-288
    • Mittra, S.1
  • 12
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems 1 3 1983 239 248
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 13
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management scheme for access control in a hierarchy
    • C.H. Lin Dynamic key management scheme for access control in a hierarchy Computer Communications 20 15 1997 1381 1385
    • (1997) Computer Communications , vol.20 , Issue.15 , pp. 1381-1385
    • Lin, C.H.1
  • 14
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • W.G. Tzeng A time-bound cryptographic key assignment scheme for access control in a hierarchy IEEE Transactions on Knowledge and Data Engineering 14 1 2002 182 188
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.G.1
  • 15
    • 0001692137 scopus 로고
    • Cryptographic key assignment scheme for access control in a hierarchy
    • C.C. Chang, and R.J. Hwang Cryptographic key assignment scheme for access control in a hierarchy Information Systems 17 3 1992 243 247
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2
  • 16
    • 0029219476 scopus 로고
    • A new public-key cipher system based upon the Diophantine equations
    • C.H. Lin, C. Chang, and R.C. Lee A new public-key cipher system based upon the Diophantine equations IEEE Transactions on Computers 44 1 1995 13 19
    • (1995) IEEE Transactions on Computers , vol.44 , Issue.1 , pp. 13-19
    • Lin, C.H.1    Chang, C.2    Lee, R.C.3
  • 18
    • 0036929565 scopus 로고    scopus 로고
    • Secure multicast in wireless networks of mobile hosts: Protocols and issues
    • Kluwer Academic Publishers
    • D. Bruschi, and E. Rosti Secure multicast in wireless networks of mobile hosts: protocols and issues Mobile Networks and Applications vol. 7 2002 Kluwer Academic Publishers 503 511
    • (2002) Mobile Networks and Applications , vol.7 , pp. 503-511
    • Bruschi, D.1    Rosti, E.2
  • 19
    • 0032628551 scopus 로고    scopus 로고
    • A conference key distribution scheme based on the theory of quadratic residues
    • K.J. Tan, and H.W. Zhu A conference key distribution scheme based on the theory of quadratic residues Computer Communications 22 8 1999 735 738
    • (1999) Computer Communications , vol.22 , Issue.8 , pp. 735-738
    • Tan, K.J.1    Zhu, H.W.2
  • 20
    • 1642403770 scopus 로고    scopus 로고
    • Comparison of inter-area re-keying algorithms for secure wireless group communications
    • C. Zhang, B. Decleene, J. Kurose, and D. Towsley Comparison of inter-area re-keying algorithms for secure wireless group communications Performance Evaluation 49 2002 1 20
    • (2002) Performance Evaluation , vol.49 , pp. 1-20
    • Zhang, C.1    Decleene, B.2    Kurose, J.3    Towsley, D.4
  • 21
    • 0032638189 scopus 로고    scopus 로고
    • Comments on 'dynamic key management schemes for access control in a hierarchy'
    • N. Lee, and T. Hwang Comments on 'dynamic key management schemes for access control in a hierarchy' Computer Communications 22 1 1999 87 89
    • (1999) Computer Communications , vol.22 , Issue.1 , pp. 87-89
    • Lee, N.1    Hwang, T.2
  • 22
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • R. Sandro, and H. David A survey of key management for secure group communication ACM Computing Surveys 35 3 2003 309 329
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Sandro, R.1    David, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.