메뉴 건너뛰기




Volumn 8, Issue 1, 2011, Pages 58-73

Balancing revocation and storage trade-offs in secure group communication

Author keywords

heterogeneous environments.; hierarchical key management; rekeying and storage trade offs; Secure multicast; user requirements and capabilities

Indexed keywords

HETEROGENEOUS NETWORKS; MULTICASTING;

EID: 78649362825     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2009.27     Document Type: Article
Times cited : (17)

References (32)
  • 1
    • 0003285503 scopus 로고    scopus 로고
    • Group key management protocol (GKMP) specification
    • July
    • H. Harney and C. Muckenhirn, "Group Key Management Protocol (GKMP) Specification", RFC 2093, July 1997.
    • (1997) RFC , vol.2093
    • Harney, H.1    Muckenhirn, C.2
  • 2
    • 0003259063 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • D. M. Wallner, E. J. Harder, and R. C. Agee, "Key Management for Multicast: Issues and Architectures", RFC 2627, 1999.
    • (1999) RFC , vol.2627
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3
  • 3
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications Using Key Graphs", IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.G.2    Lam, S.S.3
  • 4
    • 0242412970 scopus 로고    scopus 로고
    • Adaptive rekeying for secure multicast
    • special issue on comm., Oct
    • S. S. Kulkarni and B. Bruhadeshwar, "Adaptive Rekeying for Secure Multicast", IEEE/IEICE Trans. Comm., special issue on comm., vol. E86-B, no. 10, pp. 2948-2956, Oct. 2003.
    • (2003) IEEE/IEICE Trans. Comm. , vol.E86-B , Issue.10 , pp. 2948-2956
    • Kulkarni, S.S.1    Bruhadeshwar, B.2
  • 5
    • 0038043478 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • May
    • D. McGrew and A. Sherman, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees", IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.
    • (2003) IEEE Trans. Software Eng. , vol.29 , Issue.5 , pp. 444-458
    • McGrew, D.1    Sherman, A.2
  • 6
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting", Proc. ACM SIGCOMM'97, pp. 277-288, 1997.
    • (1997) Proc. ACM SIGCOMM'97 , pp. 277-288
    • Mittra, S.1
  • 13
    • 0032627571 scopus 로고    scopus 로고
    • Key management for secure internet multicast using boolean function minimization techniques
    • Mar
    • I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques", Proc. IEEE INFOCOMM'99, vol. 2, pp. 689-698, Mar. 1999.
    • (1999) Proc. IEEE INFOCOMM'99 , vol.2 , pp. 689-698
    • Chang, I.1    Engel, R.2    Kandlur, D.3    Pendarakis, D.4    Saha, D.5
  • 14
    • 0036929565 scopus 로고    scopus 로고
    • Secure multicast in wireless networks of mobile hosts: Protocols and issues
    • D. Bruschi and E. Rosti, "Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues", Mobile Networks and Applications, vol. 7, no. 6, pp. 503-511, 2002.
    • (2002) Mobile Networks and Applications , vol.7 , Issue.6 , pp. 503-511
    • Bruschi, D.1    Rosti, E.2
  • 15
    • 13244275074 scopus 로고    scopus 로고
    • Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks
    • S. Zhu, S. Setia, S. Xu, and S. Jajodia, "Gkmpan: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks", Proc. IEEE Mobiquitos'04, pp. 42-51, 2004.
    • (2004) Proc. IEEE Mobiquitos'04 , pp. 42-51
    • Zhu, S.1    Setia, S.2    Xu, S.3    Jajodia, S.4
  • 16
    • 4644294648 scopus 로고    scopus 로고
    • A scalable multicast key management scheme for heterogeneous wireless networks
    • Aug
    • Y. Sun, W. Trappe, and K. J. R. Liu, "A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks", IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , Issue.4 , pp. 653-666
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3
  • 19
    • 34147147912 scopus 로고    scopus 로고
    • Dynamic balanced key tree management for secure multicast communications
    • May
    • W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, "Dynamic Balanced Key Tree Management for Secure Multicast Communications", IEEE Trans. Computers, vol. 56, no. 5, pp. 577-589, May 2007.
    • (2007) IEEE Trans. Computers , vol.56 , Issue.5 , pp. 577-589
    • Ng, W.H.D.1    Howarth, M.2    Sun, Z.3    Cruickshank, H.4
  • 20
    • 3142723549 scopus 로고    scopus 로고
    • Optimal tree structure for key management of simultaneous join/leave in secure multicast
    • F. Zhu, A. Chan, and G. Noubir, "Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast", Proc. Military Comm. Conf. (MILCOM), 2003.
    • (2003) Proc. Military Comm. Conf. (MILCOM)
    • Zhu, F.1    Chan, A.2    Noubir, G.3
  • 25
    • 0035504627 scopus 로고    scopus 로고
    • An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
    • Nov
    • R. Poovendran and J. S. Baras, "An Information-Theoretic Approach for Design and Analysis of Rooted-Tree-Based Multicast Key Management Schemes", IEEE Trans. Information Theory, vol. 47, no. 7, pp. 2824-2834, Nov. 2001.
    • (2001) IEEE Trans. Information Theory , vol.47 , Issue.7 , pp. 2824-2834
    • Poovendran, R.1    Baras, J.S.2
  • 28
    • 55349146952 scopus 로고    scopus 로고
    • Skipping, cascade, and combined chain schemes for broadcast encryption
    • Nov
    • J. H. Cheon, N. Jho, M. Kim, and E. Yoo, "Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption", IEEE Trans. Information Theory, vol. 54, no. 11, pp. 5155-5171, Nov. 2008.
    • (2008) IEEE Trans. Information Theory , vol.54 , Issue.11 , pp. 5155-5171
    • Cheon, J.H.1    Jho, N.2    Kim, M.3    Yoo, E.4
  • 30
    • 76349090283 scopus 로고    scopus 로고
    • Host multicast: A framework for delivering multicast to end users
    • Mar
    • B. Zhang, S. Jamin, and L. Zhang, "Host Multicast: A Framework for Delivering Multicast to End Users", Proc. IEEE INFOCOM, Mar. 2000.
    • (2000) Proc. IEEE INFOCOM
    • Zhang, B.1    Jamin, S.2    Zhang, L.3
  • 31
    • 0036800741 scopus 로고    scopus 로고
    • Application-layer multicasting with delaunay triangulation overlays
    • Oct
    • J. Liebeherr, M. Nahas, and W. Si, "Application-Layer Multicasting with Delaunay Triangulation Overlays", IEEE J. Selected Areas in Comm., vol. 20, no. 8, pp. 1472-1488, Oct. 2002.
    • (2002) IEEE J. Selected Areas in Comm. , vol.20 , Issue.8 , pp. 1472-1488
    • Liebeherr, J.1    Nahas, M.2    Si, W.3
  • 32
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    • Apr
    • L. M. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment", Proc. IEEE INFOCOM, Apr. 2001.
    • (2001) Proc. IEEE INFOCOM
    • Feeney, L.M.1    Nilsson, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.