Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Self-Healing Key Distribution with Revocation
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Multi-level Secure Multicast: The Rethinking of Secure Locks
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
A Scalable Multi-service Group Key Management Scheme
AICT-ICIW '06 Proceedings of the Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Key hierarchies for hierarchical access control in secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An optimal key distribution scheme for secure multicast group communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
Mobile Networks and Applications
A new probabilistic rekeying method for secure multicast groups
International Journal of Information Security
IEEE Transactions on Information Theory
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
Distributed servers approach for large-scale secure multicast
IEEE Journal on Selected Areas in Communications
Key management approaches to offer data confidentiality for secure multicast
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
The secure multicast field has been extensively studied for more than a decade now and there exist numerous proposals throughout academic literature. This paper presents a selection of those most important and popular to the date, focusing on centralized schemes due to their high popularity and the recent publication of alternatives that do not appear in previous revisions. Comparisons are provided and special attention is paid to communications and storage overhead.