Sciweavers

175 search results - page 1 / 35
» Approximation Algorithms for Key Management in Secure Multic...
Sort
View
110
Voted
COCOON
2009
Springer
15 years 10 months ago
Approximation Algorithms for Key Management in Secure Multicast
Agnes Hui Chan, Rajmohan Rajaraman, Zhifeng Sun, F...
121
Voted
LCN
2006
IEEE
15 years 9 months ago
Efficient Algorithms for Secure Multicast key Management
Group Multicast is becoming a prevalent issue in Network applications such as teleconferencing, payper-view, and information services. In order to secure group communications by p...
Elham Khabiri, Saïd Bettayeb
133
Voted
INFOCOM
1999
IEEE
15 years 8 months ago
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
Abstract-The Internet today provides no support for privacy or authentication of multicast packets. However,an increasing number of applications will require secure multicast servi...
Isabella Chang, Robert Engel, Dilip D. Kandlur, Di...
151
Voted
TCS
2008
15 years 3 months ago
Optimizing deletion cost for secure multicast key management
Multicast and broadcast are efficient ways to deliver messages to a group of recipients in a network. Due to the growing security concerns in various applications, messages are oft...
Zhi-Zhong Chen, Ze Feng, Minming Li, F. Frances Ya...
161
Voted
WIMOB
2007
IEEE
15 years 10 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud