How to construct random functions
Journal of the ACM (JACM)
The complexity of Boolean functions
The complexity of Boolean functions
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
On Key Agreement and Conference Key Agreement
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
SEMSOMM--A Scalable Multiple Encryption Scheme for One-To-Many Multicast
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Hydra: A Decentralised Group Key Management
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
EHBT: An Efficient Protocol for Group Key Management
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
ELK, a New Protocol for Efficient Large-Group Key Distribution
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Antigone: a flexible framework for secure group communication
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Efficient communication-storage tradeoffs for multicast encryption
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Scalable secure one-to-many group communication using dual encryption
Computer Communications
The VersaKey framework: versatile group key management
IEEE Journal on Selected Areas in Communications
A survey of security issues in multicast communications
IEEE Network: The Magazine of Global Internetworking
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
Securing publish-subscribe overlay services with EventGuard
Proceedings of the 12th ACM conference on Computer and communications security
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
An Efficient Key Revocation Protocol for Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Peer-to-peer's most wanted: malicious peers
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Low power light-weight embedded systems
Proceedings of the 2006 international symposium on Low power electronics and design
Scalable and secure group rekeying in wireless sensor networks
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
PEI models towards scalable, usable and high-assurance information sharing
Proceedings of the 12th ACM symposium on Access control models and technologies
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks
Proceedings of the 2007 inaugural international conference on Distributed event-based systems
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Efficient group key management for multi-privileged groups
Computer Communications
An innovative revocation scheme for one-to-many E-services
Electronic Commerce Research and Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Secure web service federation management using tpm virtualisation
Proceedings of the 2007 ACM workshop on Secure web services
The complete optimal stars-clustering-tree problem
Discrete Applied Mathematics
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
Multicast for multimedia collaborative applications: services and mechanisms
International Journal of Advanced Media and Communication
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Audit and backup procedures for hardware security modules
Proceedings of the 7th symposium on Identity and trust on the Internet
A tree-based scheme for security of many-to-many communications
Journal of High Speed Networks - Broadband Multimedia Sensor Networks in Healthcare Applications
Optimizing deletion cost for secure multicast key management
Theoretical Computer Science
Access control in publish/subscribe systems
Proceedings of the second international conference on Distributed event-based systems
A novel secure communication scheme in vehicular ad hoc networks
Computer Communications
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
Stale-safe security properties for group-based secure information sharing
Proceedings of the 6th ACM workshop on Formal methods in security engineering
A heterogeneity-aware framework for group key management in wireless mesh networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A key management solution for overlay-live-streaming
Proceedings of the workshop on Security in Opportunistic and SOCial networks
ESCAPE: A Component-Based Policy Framework for Sense and React Applications
CBSE '08 Proceedings of the 11th International Symposium on Component-Based Software Engineering
Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Engineering of Software-Intensive Systems: State of the Art and Research Challenges
Software-Intensive Systems and New Computing Paradigms
Key hierarchies for hierarchical access control in secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Supporting flexible streaming media protection through privacy-aware secure processors
Computers and Electrical Engineering
Approximately optimal trees for group key management with batch updates
Theoretical Computer Science
An efficient group key management scheme for mobile ad hoc networks
International Journal of Security and Networks
Securing publish/subscribe for multi-domain systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
A policy management framework for content-based publish/subscribe middleware
Proceedings of the ACM/IFIP/USENIX 2007 International Conference on Middleware
International Journal of Ad Hoc and Ubiquitous Computing
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
TKS: a transition key management scheme for secure application level multicast
International Journal of Security and Networks
RLH: receiver driven layered hash-chaining for multicast data origin authentication
Computer Communications
Peer-to-peer's most wanted: Malicious peers
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Scalable key management algorithms for location-based services
IEEE/ACM Transactions on Networking (TON)
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Self-encryption scheme for data security in mobile devices
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Key management scheme for multi-layer secure group communication
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
A tree key graph design scheme for hierarchical multi-group access control
IEEE Communications Letters
A master-slave recommended credibility model in mobile P2P based on chord
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Approximately optimal trees for group key management with batch updates
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
A policy based approach to managing shared data in dynamic collaborations
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A policy management framework for content-based publish/subscribe middleware
MIDDLEWARE2007 Proceedings of the 8th ACM/IFIP/USENIX international conference on Middleware
A novel group key management based on Jacobian Elliptic Chebyshev rational map
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Scalable and efficient approach for secure group communication
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Secure group communication using binomial trees
ANTS'09 Proceedings of the 3rd international conference on Advanced networks and telecommunication systems
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
DAKS: an efficient batch rekeying scheme for departure-aware multicast services
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Chosen ciphertext secure authenticated group communication using identity-based signcryption
Computers & Mathematics with Applications
An optimal key distribution scheme for secure multicast group communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
Mobile Networks and Applications
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
An efficient and scalable EBS-based batch rekeying scheme for secure group communications
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Group-centric models for secure and agile information sharing
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Securing communication of dynamic groups in dynamic network-centric environments
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
A policy-based publish/subscribe middleware for sense-and-react applications
Journal of Systems and Software
On performance of group key distribution techniques when applied to IPTV services
Computer Communications
Keeping group communications private: An up-to-date review on centralized secure multicast
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks
ACM Transactions on Embedded Computing Systems (TECS)
EventGuard: A System Architecture for Securing Publish-Subscribe Networks
ACM Transactions on Computer Systems (TOCS)
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
On the security of attribute certificate structuring for highly distributed computing environments
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Partial group session key agreement scheme for mobile agents in e-commerce environment
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
EKM: an efficient key management scheme for large-scale peer-to-peer media streaming
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
A novel key management and distribution solution for secure video multicast
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
An efficient hierarchical group key management protocol for a ubiquitous computing environment
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Distributed hierarchical access control for secure group communications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Adaptive security of symbolic encryption
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Towards enhanced key management in multi-phase ZigBee network architecture
Computer Communications
An efficient access control model utilized the attribute certificate structuring
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Secure multicast using proxy encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An extension of secure group communication using key graph
Information Sciences: an International Journal
Journal of Computational and Applied Mathematics
Securing publish/subscribe for multi-domain systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
VECoS'10 Proceedings of the Fourth international conference on Verification and Evaluation of Computer and Communication Systems
Privacy-preserving identity-based broadcast encryption
Information Fusion
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
Fine-grained user access control in ciphertext-policy attribute-based encryption
Security and Communication Networks
BloomCasting: security in bloom filter based multicast
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Key management schemes for multilayer and multiple simultaneous secure group communication
ISRN Communications and Networking
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
An adaptable and scalable group access control scheme for managing wireless sensor networks
Telematics and Informatics
A security adaptation reference monitor for wireless sensor network
ISRN Communications and Networking
International Journal of Wireless Networks and Broadband Technologies
New ciphertext-policy attribute-based access control with efficient revocation
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
A scalable server for key distribution and its application to accounting
The Journal of Supercomputing
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
Key Management in Secure Satellite Multicast Using Key Hypergraphs
Wireless Personal Communications: An International Journal
A scalable encryption scheme for multi-privileged group communications
The Journal of Supercomputing
Hierarchical approaches for multicast based on Euclid's algorithm
The Journal of Supercomputing
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improved migration for mobile computing in distributed networks
Computer Standards & Interfaces
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE/ACM Transactions on Networking (TON)
Secure group re-keying using key inverses
Journal of High Speed Networks
Hi-index | 0.00 |
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group communication. Although encryption can be used to protect messages exchanged among group members, distributing the cryptographic keys becomes an issue. Researchers have proposed several different approaches to group key management. These approaches can be divided into three main classes: centralized group key management protocols, decentralized architectures and distributed key management protocols. The three classes are described here and an insight given to their features and goals. The area of group key management is then surveyed and proposed solutions are classified according to those characteristics.