Java 2 Network Security
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation.
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
The most promising protocols for multicast key management are those based on multilevel logical binary trees of Key Encryption Keys (KEKs). One of these protocols, Logical Key Hierarchy (LKH) has become a standard de facto today. This work presents an open implementation of LKH protocol for Java applications that enables the use of Multicast Security in web applications.