Information Technology Reference
In-Depth Information
10. Waldvogel, M., Caronni, G., Sun, D., Weiler, N., Plattner, B.: The VersaKey frame-
work: versatile group key management. IEEE Journal on Selected Areas in Com-
munications 17(9), 1614-1631 (1999)
11. Di Pietro, R., Mancini, L.V., Jajodia, S.: Ecient and secure keys management for
wireless mobile communications. In: Proceedings of POMC 2002, pp. 66-73 (2002)
12. Lin, J.-C., Huang, K.-H., Lai, F., Lee, H.-C.: Secure and ecient group key man-
agement with shared key derivation. Comput. Stand. Inter. 31(1), 192-208 (2009)
13. Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using
one-way function trees. IEEE Trans. Software 29, 444-458 (2003)
14. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast se-
curity: A taxonomy and some ecient constructions. In: Proceedings of INFOCOM
1999, pp. 708-716. IEEE, Los Alamitos (1999)
15. Perrig, A., Song, D., Tygar, J.D.: Elk, a new protocol for ecient large-group key
distribution. Proceedings of IEEE S&P, 247-262 (2001)
16. Horng, G.: Cryptanalysis of a key management scheme for secure multicast com-
munications. IEICE Transactions on Communications E85-B(5), 1050-1051 (2002)
17. Ku, W.-C., Chen, S.-M.: An improved key management scheme for large dynamic
groups using one-way function trees. In: Proceedings 2003 International Conference
on Parallel Processing Workshops, pp. 391-396 (October 2003)
18. Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management
for secure internet multicast using boolean function minimization techniques. In:
Proceedings of INFOCOM 1999, pp. 689-698. IEEE, Los Alamitos (1999)
19. Poovendran, R., Baras, J.S.: An information-theoretic approach for design and
analysis of rooted-tree-based multicast key management schemes. IEEE Transac-
tions on Information Theory, 2824-2834 (2001)
20. Zhou, Z., Huang, D.: An optimal key distribution scheme for secure multicast group
communication. In: INFOCOM 2010, pp. 331-335 (2010)
21. Canetti, R., Malkin, T., Nissim, K.: Ecient communication-storage tradeoffs for
multicast encryption, pp. 459-474. Springer, Heidelberg (1999)
22. Chiou, G.-h., Chen, W.-T.: Secure broadcasting using the secure lock. IEEE Trans.
Softw. Eng. 15(8), 929-934 (1989)
23. Naranjo, J.A.M., Lopez-Ramos, J.A., Casado, L.G.: Applications of the Extended
Euclidean Algorithm to privacy and secure communications. In: Proceedings of
CMMSE (2010)
24. Scheikl, O., Lane, J., Boyer, R., Eltoweissy, M.: Multi-level secure multicast: the
rethinking of secure locks. In: Proceedings International Conference on Parallel
Processing Workshops, pp. 17-24 (2002)
25. Pais, A.R., Joshi, S.: A new probabilistic rekeying method for secure multicast
groups. Int. J. Inf. Secur. 9, 275-286 (2010)
26. Sun, Y., Liu, K.J.R.: Scalable hierarchical access control in secure group commu-
nications. In: INFOCOM 2004, vol. 2, pp. 1296-1306 (2004)
27. Sun, Y., Liu, K.J.R.: Hierarchical group access control for secure multicast com-
munications. IEEE/ACM Trans. Netw. 15, 1514-1526 (2007)
28. Zhang, Q., Wang, Y., Jue, J.P.: A key management scheme for hierarchical access
control in group communication. International Journal of Network Security 7(3),
323-334 (2008)
29. Zhang, J., Varadharajan, V., Mu, Y.: A scalable multi-service group key manage-
ment scheme. In: Proceedings of AICT-ICIW 2006, pp. 172-177 (2006)
30.Yan,J.,Ma,J.,Liu,H.:Keyhierarchiesfor hierarchical access control in secure
group communications. Computer Networks 53(3), 353-364 (2009)
Search WWH ::




Custom Search