메뉴 건너뛰기




Volumn , Issue , 2008, Pages 406-411

Notes on the CRTDH group key agreement protocol

Author keywords

Chinese remainder theorem; Contributory group key agreement; Diffie Hellman key exchange; Group key management (GKM); Secure group communication

Indexed keywords

COMPUTER SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; LAWS AND LEGISLATION; SECURITY OF DATA; SPONTANEOUS EMISSION; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51849155543     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.Workshops.2008.36     Document Type: Conference Paper
Times cited : (9)

References (39)
  • 3
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad-hoc networks
    • N. Asokan and P. Ginzboorg. Key agreement in ad-hoc networks. In Computer Communications, volume 23, pages 1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 4
    • 51849148773 scopus 로고    scopus 로고
    • Algorithmic number theory, volume I: Efficient algorithms
    • E. Bach and J. Shallit. Algorithmic number theory, volume I: Efficient algorithms. The MIT Press, 1996.
    • (1996) The MIT Press
    • Bach, E.1    Shallit, J.2
  • 7
    • 0035789267 scopus 로고    scopus 로고
    • S. Basagni, K. Herrin, E. Rosti, and D. Bruschi. Secure pebblenets. In In Proc. of ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc), 2001.
    • S. Basagni, K. Herrin, E. Rosti, and D. Bruschi. Secure pebblenets. In In Proc. of ACM International Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc), 2001.
  • 8
    • 0032218239 scopus 로고    scopus 로고
    • C. Becker and U. Wille. Communication complexity of group key distribution. In In Proc. of 5th ACM Conference on Computer and Communication Security, 1998.
    • C. Becker and U. Wille. Communication complexity of group key distribution. In In Proc. of 5th ACM Conference on Computer and Communication Security, 1998.
  • 10
    • 51849121791 scopus 로고    scopus 로고
    • M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In In Advances in Cryptology - EUROCRYPT, 1994.
    • M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In In Advances in Cryptology - EUROCRYPT, 1994.
  • 14
    • 0033689166 scopus 로고    scopus 로고
    • L. R. Dondeti, S. Mukherjee, and A. Samal. DISEC: a distributed framework for scalable secure many-to-many communication. In Proceedings of Fifth IEEE Symposium on Computers and Communications (ISCC 2000), pages 693-698, July 2000.
    • L. R. Dondeti, S. Mukherjee, and A. Samal. DISEC: a distributed framework for scalable secure many-to-many communication. In Proceedings of Fifth IEEE Symposium on Computers and Communications (ISCC 2000), pages 693-698, July 2000.
  • 19
    • 84904875614 scopus 로고    scopus 로고
    • Distributed collaborative key agreement protocols for dynamic peer groups
    • Nov
    • P. Lee, J. Lui, and D. Yau. Distributed collaborative key agreement protocols for dynamic peer groups. Proc. IEEE Int'l Conf. Network Protocols (ICNP), pages 322-333, Nov. 2002.
    • (2002) Proc. IEEE Int'l Conf. Network Protocols (ICNP) , pp. 322-333
    • Lee, P.1    Lui, J.2    Yau, D.3
  • 21
    • 84942438500 scopus 로고    scopus 로고
    • Batch rekeying for secure group communications
    • May
    • X. Li, Y. Yang, M. Gouda, and S. Lam. Batch rekeying for secure group communications. Proc. 10th Int'l WWW Conf., pages 525-534, May 2001.
    • (2001) Proc. 10th Int'l WWW Conf , pp. 525-534
    • Li, X.1    Yang, Y.2    Gouda, M.3    Lam, S.4
  • 22
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra. Iolus: A framework for scalable secure multicasting. Journal of Computer Communication Reviews, 27(4):277-288, 1997.
    • (1997) Journal of Computer Communication Reviews , vol.27 , Issue.4 , pp. 277-288
    • Mittra, S.1
  • 23
    • 34147147912 scopus 로고    scopus 로고
    • Dynamic balanced key tree management for secure multicast communications
    • May
    • W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank. Dynamic balanced key tree management for secure multicast communications. IEEE Transactions on Computers, 56(5):577-589, May 2007.
    • (2007) IEEE Transactions on Computers , vol.56 , Issue.5 , pp. 577-589
    • Ng, W.H.D.1    Howarth, M.2    Sun, Z.3    Cruickshank, H.4
  • 25
    • 84883860719 scopus 로고    scopus 로고
    • Balanced batch lkh: New proposal, implementation and performance evalution
    • June
    • J. Pegueroles and F. Rico-Novella. Balanced batch lkh: New proposal, implementation and performance evalution. Proc. IEEE Symp. Computers and Comm. (ISCC), pages 815-820, June 2003.
    • (2003) Proc. IEEE Symp. Computers and Comm. (ISCC) , pp. 815-820
    • Pegueroles, J.1    Rico-Novella, F.2
  • 28
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli and D. Hutchison. A survey of key management for secure group communication. ACM Computing Surveys, 35(3):309-329, 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 30
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • A. T. Sherman and D. A. McGrew. Key establishment in large dynamic groups using one-way function trees. IEEE transactions on Software Engineering, 29(5):444-458, May 2003.
    • (2003) IEEE transactions on Software Engineering , vol.29 , Issue.5 , pp. 444-458
    • Sherman, A.T.1    McGrew, D.A.2
  • 34
    • 0032178082 scopus 로고    scopus 로고
    • SIGCOMM '98, Also University of Texas at Austin, Computer Science Technical report TR 97-23
    • Dec
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. SIGCOMM '98, Also University of Texas at Austin, Computer Science Technical report TR 97-23, pages 68-79, Dec. 1998.
    • (1998) , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 38
    • 84891452488 scopus 로고    scopus 로고
    • X. Zou, B. Ramamurthy, and S. S. Magliveras, editors, Springer, Norwell, MA
    • X. Zou, B. Ramamurthy, and S. S. Magliveras, editors. Secure Group Communications over Data Networks. Springer, Norwell, MA, 2004.
    • (2004) Secure Group Communications over Data Networks
  • 39
    • 79952914028 scopus 로고    scopus 로고
    • An authenticated key agreement protocol for mobile ad hoc networks
    • Dec
    • X. Zou, A. Thukral, and B. Ramamurthy. An authenticated key agreement protocol for mobile ad hoc networks. Lecture Notes in Computer Science (LNCS), 4325:509-520, Dec. 2006.
    • (2006) Lecture Notes in Computer Science (LNCS) , vol.4325 , pp. 509-520
    • Zou, X.1    Thukral, A.2    Ramamurthy, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.