메뉴 건너뛰기




Volumn 11, Issue 1, 2010, Pages 33-38

Secure group key management scheme for multicast networks

Author keywords

Group controller; Group key management; Multicast; Session encryption key; Sub group controller; Unicast

Indexed keywords

ENCRYPTION KEY; GROUP CONTROLLERS; GROUP KEY MANAGEMENT; MULTICASTS; SUB-GROUPS; UNICAST;

EID: 80054068072     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (32)

References (15)
  • 2
    • 66549088524 scopus 로고    scopus 로고
    • Multicast security: A taxanomy and some efficient constructions
    • Mar
    • R. Canatti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pankus, "Multicast security: A taxanomy and some efficient constructions," IEEE Network, vol. 2, pp. 122-128, Mar. 1999.
    • (1999) IEEE Network , vol.2 , pp. 122-128
    • Canatti, R.1    Garay, J.2    Itkis, G.3    Micciancio, D.4    Naor, M.5    Pankus, B.6
  • 3
    • 0242414397 scopus 로고    scopus 로고
    • Key management approaches to offer data confidentiality for securemulticast
    • K. C. Chan and S. H. G. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Network, vol. 17, no. 5, pp. 31-39, Oct. 2003.
    • (2003) IEEE Network , vol.17 , Issue.5 , pp. 31-39
    • Chan, K.C.1    Chan, S.H.G.2
  • 6
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: A survey
    • Feb
    • P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey,"IEEE Network, vol. 17, pp. 30-36, Feb. 2003.
    • (2003) IEEE Network , vol.17 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 8
    • 0036505660 scopus 로고    scopus 로고
    • Design of secure multicast key management scheme with communication budget constraint
    • Mar
    • M. Li, R. Poovendran, and C. Bernstein, "Design ofsecure multicast key management scheme with communication budget constraint," IEEE Communications Letters, vol. 6, no. 3, pp. 108-110, Mar. 2002.
    • (2002) IEEE Communications Letters , vol.6 , Issue.3 , pp. 108-110
    • Li, M.1    Poovendran, R.2    Bernstein, C.3
  • 9
    • 0033356116 scopus 로고    scopus 로고
    • A survey of security issues in multicast communications
    • Mar
    • M. Moyer, J. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network Magazine, vol. 13, no. 6, pp. 12-23, Mar. 1999.
    • (1999) IEEE Network Magazine , vol.13 , pp. 12-23
    • Moyer, M.1    Rao, J.2    Rohatgi, P.3
  • 10
    • 84858224247 scopus 로고    scopus 로고
    • A new secure multicast key distribution protocol using combinatorial boolean approach
    • M. M. N. Rasslan, Y. H. Dakroury, and H. K. Aslan,"A new secure multicast key distribution protocol using combinatorial boolean approach," International Journal of Network Security, vol. 8, no. 1, pp. 75-89,2009.
    • (2009) International Journal of Network Security , vol.8 , Issue.1 , pp. 75-89
    • Rasslan, M.M.N.1    Dakroury, Y.H.2    Aslan, H.K.3
  • 12
    • 0003978251 scopus 로고    scopus 로고
    • Key Management for Multicast: Issues and Architecture
    • RFC 2627, June
    • D. M. Wallner, E. J. Harder, and R. C. Agee, Key Management for Multicast: Issues and Architecture, RFC 2627, June 1999.
    • (1999)
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3
  • 13
    • 40049083567 scopus 로고    scopus 로고
    • Effcient key agreement for large and dynamic multicast groups
    • L. Wang and C. K. Wu, "Effcient key agreement for large and dynamic multicast groups," International Journal of Network Security, vol. 3, no. 1, pp. 8-17,2006.
    • (2006) InternationalJournal of Network Security , vol.3 , Issue.1 , pp. 8-17
    • Wang, L.1    Wu, C.K.2
  • 15
    • 80054085558 scopus 로고    scopus 로고
    • A peer-based recovery scheme for group rekeying in secure multicast
    • Q. Zhang and K. L. Calvert, "A peer-based recovery scheme for group rekeying in secure multicast," International Journal of Networ Security, vol. 6, no.1, pp. 15-25, 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.1 , pp. 15-25
    • Zhang, Q.1    Calvert, K.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.