메뉴 건너뛰기




Volumn , Issue , 2007, Pages 123-129

Decentralized group key management for dynamic networks using proxy cryptography

Author keywords

Group key management; Proxy cryptography; Secure multicast

Indexed keywords

COMMUNICATION SYSTEMS; CRYPTOGRAPHY; MESSAGE PASSING; SECURITY SYSTEMS;

EID: 42149154467     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1298239.1298261     Document Type: Conference Paper
Times cited : (18)

References (10)
  • 1
    • 0345565893 scopus 로고    scopus 로고
    • S. Rafaeli, D. Hutchison. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys, 35, no. 3, pp. 309-329, 2003.
    • S. Rafaeli, D. Hutchison. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, 2003.
  • 2
    • 0032178082 scopus 로고    scopus 로고
    • Secure Group Communications Using Key Graphs
    • C. K. Wong, M. G. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. ACM SIGCOMM 1998, pp. 68-79, 1998.
    • (1998) ACM SIGCOMM 1998 , pp. 68-79
    • Wong, C.K.1    Gouda, M.G.2    Lam, S.S.3
  • 6
    • 33646735175 scopus 로고    scopus 로고
    • Y. Chiu, C. Lei, C. Huang. Secure Multicast Using Proxy Encryption. In Proceedings of International Conference on Information and Communications Security, ICICS 2005, Lecture Notes in Computer Science, 3783, pp. 280-290, 2005.
    • Y. Chiu, C. Lei, C. Huang. Secure Multicast Using Proxy Encryption. In Proceedings of International Conference on Information and Communications Security, ICICS 2005, Lecture Notes in Computer Science, vol. 3783, pp. 280-290, 2005.
  • 9
    • 84958979582 scopus 로고    scopus 로고
    • On the Security of ElGamal Based Encryption
    • Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC'98
    • Y. Tsiounis, M. Yung. On the Security of ElGamal Based Encryption. In Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Lecture Notes in Computer Science, vol. 1431, pp. 117-134, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1431 , pp. 117-134
    • Tsiounis, Y.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.