Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Probabilistic optimization techniques for multicast key management
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the Decidability of Cryptographic Protocols with Open-Ended Data Structures
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
Network Security in the Multicast Framework
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Probabilistic Methods in Multicast Key Management
ISW '00 Proceedings of the Third International Workshop on Information Security
Intrusion-Tolerant Group Management in Enclaves
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Network security in the multicast framework
Advanced lectures on networking
Multiparty authentication services and key agreement protocols with semi-trusted third party
Journal of Computer Science and Technology
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
A Secure Wireless Agent-based Testbed
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
New application of reliable agreement: underlying an unsecured business environment
ACM SIGOPS Operating Systems Review
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hierarchy-based key management for secure group communications in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Multichannel Security Protocols
IEEE Pervasive Computing
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
ACM Transactions on Computational Logic (TOCL)
Secure authenticated group key agreement protocol in the MANET environment
Information Security Tech. Report
An efficient group key management scheme for mobile ad hoc networks
International Journal of Security and Networks
Secure group communication in wireless mesh networks
Ad Hoc Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
nPAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
Journal of Computer Science and Technology
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
Usable key agreement in home networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Key agreement in ad hoc networks
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Multigroup rekeying for a wireless network
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks
Journal of Network and Computer Applications
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
A novel convinced diffie-hellman computation scheme and its cryptographic application
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
A secure checkpointing protocol for survivable server design
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Verification of security protocols with lists: from length one to unbounded length
POST'12 Proceedings of the First international conference on Principles of Security and Trust
KALwEN: a new practical and interoperable key management scheme for body sensor networks
Security and Communication Networks
Authenticity check to provide trusted platform in MANET (ACTP)
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
An Enhanced Hierarchical Key Management Scheme for MANETs
Wireless Personal Communications: An International Journal
Verification of security protocols with lists: From length one to unbounded length
Journal of Computer Security - Security and Trust Principles
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications
Hi-index | 0.00 |
This paper considers the problem of key agreement in a group setting with highly-dynamic group member population. A protocol suite, called CLIQUES, is developed by extending the well-known Diffie-Hellman key agreement method to support dynamic group operations. Constituent protocols are provably secure and efficient.