Dynamic configuration of batch rekeying interval for secure multicast service

DH Je, HS Kim, YH Choi… - … Conference on Computing …, 2014 - ieeexplore.ieee.org
Batch rekeying has been used for improving the group rekeying efficiency in a large-scale
group communication. However, there exists a tradeoff between the number of rekeying …

A computationally efficient key-hiding based group re-keying scheme for secure multicasting

YM Asem, A Kara - International Journal of Computers and …, 2006 - Taylor & Francis
Multicast security is becoming an important networking issue because of the growing
number of network applications that rely on multicast communication. Scalable group re …

Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication

S Senan, AHA Hashim, R Othman… - 2015 International …, 2015 - ieeexplore.ieee.org
A group key management has an important role in multicast security in order to achieve data
integrity and confidentiality. The session key is a common secret key for a group of users in …

Improved LKH for batch rekeying in multicast groups

J Pegueroles, F Rico-Novella… - … and Education, 2003 …, 2003 - ieeexplore.ieee.org
Storage, delivery and update of cryptographic keys are the most important items to study in
multicast security. Traditionally a centralized trusted third party called the key server (KS) …

[PDF][PDF] An efficient group rekeying method using enhanced one way function tree protocol

BP Varthini, S Valli - IJCSNS, 2006 - researchgate.net
There are several group key management solutions to implement group rekeying in secure
multicast communication. These solutions suffer from 1 affects all phenomena if they use …

User-Oriented batch processing of individual rekeying

H Lee, B Rhee, E Kim, S Han - 2008 International Conference …, 2008 - ieeexplore.ieee.org
For a long time multicast security researches have been going on. In multicast security the
group key must be changed whenever users join or leave. We called it'rekeying'. There are …

Efficient algorithms for secure multicast key management

E Khabiri, S Bettayeb - … . 2006 31st IEEE Conference on Local …, 2006 - ieeexplore.ieee.org
Group multicast is becoming a prevalent issue in network applications such as
teleconferencing, pay-per-view, and information services. In order to secure group …

[PDF][PDF] Performance comparison of stateful and stateless group rekeying algorithms

W Chen, LR Dondeti, Y Sun - … Journal of Computer Science and Network …, 2008 - Citeseer
Scalable group rekeying schemes proposed in the literature can be classified into two
categories: stateful schemes, eg, logical key hierarchy (LKH) based approaches, and …

A key distribution and rekeying framework with totally ordered multicast protocols

S Tanaka, F Sato - Proceedings 15th International Conference …, 2001 - ieeexplore.ieee.org
Many network applications based on a group communications model have been developed.
As a remit securing group communications, ie, providing confidentiality, authenticity and …

Batch rekeying model based on queueing theory in secure group communication

G Li, B Li, T Du, J Pan, Y Li - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
We investigate optimal rekeying interval problem in batch rekeying. A Markov model is
developed for batch rekeying process. The model is then used to analyze the relationship …