Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
Anonymous credentials with biometrically-enforced non-transferability
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Key distribution techniques for sensor networks
Wireless sensor networks
Sliding-window self-healing key distribution
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Gossip-based scalable and reliable group key distribution framework
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks
Journal of Computer Security
A unified model for unconditionally secure key distribution
Journal of Computer Security
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Flaws in some self-healing key distribution schemes with revocation
Information Processing Letters
Reliable Key Distribution Scheme for Lossy Channels
IEICE - Transactions on Information and Systems
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
IEEE Transactions on Wireless Communications
An authenticated self-healing key distribution scheme based on bilinear pairings
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Wireless broadcast encryption based on smart cards
Wireless Networks
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Generalized self-healing key distribution using vector space access structure
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
An Efficient and Secure Self-Healing Scheme for LKH
Journal of Network and Systems Management
A study on secure protocol using the public key infrastructure approach in an e-passport
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A mutual-healing key distribution scheme in wireless sensor networks
Journal of Network and Computer Applications
Securing cluster-based ad hoc networks with distributed authorities
IEEE Transactions on Wireless Communications
Collusion attack on a self-healing key distribution with revocation in wireless sensor networks
WISA'10 Proceedings of the 11th international conference on Information security applications
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Access polynomial based self-healing key distribution with improved security and performance
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Self-healing key distribution schemes with sponsorization
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Network access control for mobile ad-hoc networks
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
On threshold self-healing key distribution schemes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Collusion resistant self-healing key distribution in mobile wireless networks
International Journal of Wireless and Mobile Computing
Designing scalable self-healing key distribution schemes with revocation capability
ISPA'07 Proceedings of the 5th international conference on Parallel and Distributed Processing and Applications
Security and Communication Networks
A conditional access system with efficient key distribution and revocation for mobile pay-TV systems
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Hi-index | 0.00 |
We address the problem of establishing a group key amongst a dynamicgroup of users over an unreliable, or lossy, network.We term ourkey distribution mechanisms self-healing because users arecapable of recovering lost group keys on their own, withoutrequesting additional transmissions from the group manager, thuscutting back on network traffic, decreasing the load on the groupmanager, and reducing the risk of user exposure through trafficanalysis. A user must be a member both before and after the sessionin which a particular key is sent in order to be able to recover thekey through self-healing. Binding the ability to recover keys tomembership status enables the group manager to use short broadcaststo establish group keys, independent of the group size.Inaddition, the self-healing approach to key distribution isstateless, meaning that a group member who has been off-line forsome time is able to recover new session keys immediately aftercoming back on-line.