Create New Account
Login
Search or Buy Articles
Browse Journals
Browse Proceedings
Submit your Paper
Submission Information
Journal Review
Recommend to Your Library
Call for Papers
A COMPUTATIONALLY EFFICIENT KEY-HIDING BASED GROUP RE-KEYING SCHEME FOR SECURE MULTICASTING
Y.M. Asem and A. Kara
References
[1] C.K. Wong, M. Gouda, & S.S. Lam, Secure group communi-cations using key graphs, IEEE/ACM Trans. on Networking,8 (1), 2000, 16–30.
doi:10.1109/90.836475
[2] I. Chang, R. Engel, D. Kandlur, D. Pendrakis, & D. Saha,Key management for secure Internet multicast using Booleanfunction minimization techniques, Proc. IEEE INFOCOM’99,2, New York, March 1999, 689–698.
[3] D. Wallner, E. Harder, & R. Agee, Key management for multi-cast: Issues and architectures, RFC (Request For Comments)2627, June 1999.
[4] D. Balenson, D.A. McGrew, & A.T. Sherman, Key establish-ment in large dynamic groups using one-way function treesand amortized initialization, Internet draft (Work in Progress,http://www.ietf.org/ID.html), 1999.
[5] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, &B. Pinkas, Multicast security: A taxonomy and some efficientconstructions, Proc. INFOCOM’99, 1999, 708–716.
doi:10.1109/INFCOM.1999.751457
[6] S. Mittra, Iolus: A framework for scalable secure multicasting,Proc. ACM SIGCOMM’97, Canne, France, 1997, 277–288.
doi:10.1145/263109.263179
[7] G.-H. Chiou & W.-T. Chen, Secure broadcasting using thesecure lock, IEEE Trans. Software Engineering, 15, 1989,929–934.
doi:10.1109/32.31350
[8] M. Abdalla, Y. Shavitt, & A. Wool, Key management forrestricted multicast using broadcast encryption, IEEE/ACMTrans. Networking, 8 (4), 2000, 443–454.
doi:10.1109/90.865073
[9] M. Steiner, G. Tsudik, & M. Waidner, Key agreement indynamic peer groups, IEEE Trans. Parallel and DistributedSystems, 11 (8), 2000, 769–780.
doi:10.1109/71.877936
[10] Y.M. Asem & A. Kara, Combining secure lock with keygraph for efficient group rekeying. Proc. ICT2003, Bangkok,Thailand, April 2003, 235–239.
[11] T. Hardjono & B. Weis, The multicast group security archi-tecture, RFC 3740, March 2004.
[12] S. Kent & R. Atkinson, Security architecture for the Internetprotocol, RFC 2401, November 1998.
[13] T. Dierks & C. Allen, The TLS protocol version 1.0, RFC2246, January 1999.
[14] S. Setia, S. Koussih, & S. Jajodia, Kronos: A scalable groupre-keying approach for secure multicast, 2000 IEEE Symp. onSecurity and Privacy, Oakland, CA, May 2000, 215–229.72
doi:10.1109/SECPRI.2000.848459
Important Links:
Abstract
DOI:
10.2316/Journal.202.2006.1.202-1677
From Journal
(202) International Journal of Computers and Applications - 2006
Go Back