메뉴 건너뛰기




Volumn 6, Issue 3, 2009, Pages 188-201

KTR: An efficient key management scheme for secure data access control in wireless broadcast services

Author keywords

Access control; Key distribution; Key hierarchy; Key management; Secure group communication; Wireless broadcast

Indexed keywords

CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS;

EID: 69249144890     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2008.12     Document Type: Article
Times cited : (24)

References (28)
  • 3
    • 0035001560 scopus 로고    scopus 로고
    • A lower bound for multicast key distribution
    • J. Snoeyink, S. Suri, and G. Varghese, "A Lower Bound for Multicast Key Distribution," Proc. IEEE INFOCOM '01, vol.1, pp. 422-431, 2001.
    • (2001) Proc. IEEE INFOCOM '01 , vol.1 , pp. 422-431
    • Snoeyink, J.1    Suri, S.2    Varghese, G.3
  • 4
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proc. ACM SIGCOMM '97, pp. 277-288, 1997.
    • (1997) Proc. ACM SIGCOMM '97 , pp. 277-288
    • Mittra, S.1
  • 5
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using keygraphs
    • C.K. Wong, M. Gouda, and S.S. Lam, "Secure Group Communications Using Key Graphs," Proc. ACMSIGCOMM'98, pp.68-79, 1998.
    • (1998) Proc. ACMSIGCOMM'98 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 9
    • 18144403493 scopus 로고    scopus 로고
    • Reliable group rekeying with a customer perspective
    • M. Onen and R. Molva, "Reliable Group Rekeying with a Customer Perspective," Proc. IEEE Global Telecom. Conf., vol.4, pp. 2072-2076, 2004.
    • (2004) Proc. IEEE Global Telecom. Conf. , vol.4 , pp. 2072-2076
    • Onen, M.1    Molva, R.2
  • 10
    • 84957656774 scopus 로고    scopus 로고
    • Marks: Zero side effect multicast key management using arbitrarily revealed key sequences
    • B. Briscoe, "Marks: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences," Proc. First Int'l Workshop Networked Group Comm., pp. 301-320, 1999.
    • (1999) Proc. First Int'l Workshop Networked Group Comm. , pp. 301-320
    • Briscoe, B.1
  • 11
    • 84975035144 scopus 로고    scopus 로고
    • Key management for encrypted broadcast
    • A. Wool, "Key Management for Encrypted Broadcast," ACM Trans. Information and System Security, vol.3, no.2, pp. 107-134, 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.2 , pp. 107-134
    • Wool, A.1
  • 19
    • 84869697283 scopus 로고    scopus 로고
    • Irdeto Access, http://www.irdeto.com/index.html , 2006.
    • (2006)
  • 20
    • 2942678810 scopus 로고    scopus 로고
    • Analysis of the nagravision video scrambling method
    • Univ. of Cambridge
    • M.G. Kuhn, "Analysis of the Nagravision Video Scrambling Method," technical report, Univ. of Cambridge, 1998.
    • (1998) Technical Report
    • Kuhn, M.G.1
  • 21
    • 84869701479 scopus 로고    scopus 로고
    • Viaccess, http://www.viaccess.com/en/ , 2006.
    • (2006)
  • 22
    • 84869710923 scopus 로고    scopus 로고
    • NDS Videoguard: Security, Flexibility, and Growth, http://www . ndsworld.com/conditional-access/conditional-access.html, 2006.
    • (2006)
  • 28
    • 8344221947 scopus 로고    scopus 로고
    • Scalable hierarchical access control in secure group communications
    • Y. Sun and K.R. Liu, "Scalable Hierarchical Access Control in Secure Group Communications," Proc. IEEE INFOCOM, 2004.
    • (2004) Proc. IEEE INFOCOM
    • Sun, Y.1    Liu, K.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.