Results 201 to 210 of about 780,853 (256)
Some of the next articles are maybe not open access.
Flexible Robust Group Key Agreement
IEEE Transactions on Parallel and Distributed Systems, 2011A robust group key agreement protocol (GKA) allows a set of players to establish a shared secret key, regardless of network/node failures. Current constant-round GKA protocols are either efficient and nonrobust or robust but not efficient; assuming a reliable broadcast communication medium, the standard encryption-based group key agreement protocol can
S Jarecki, null Jihye Kim, G Tsudik
openaire +1 more source
2006
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire +1 more source
EDGAR: Extended Dynamic Group-Key AgReement
2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010Secure group communication has been an important research area for a couple of decades. There exists a myriad of algorithms and systems for establishing a group key securely. Nowadays researches focus on the high group dynamics because the mobile ad hoc network and the wireless sensor network are emerging environments; thereby devices have high ...
Jonguk Kim +3 more
openaire +1 more source
Group-Based Authentication and Key Agreement
Wireless Personal Communications, 2010This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated
Yu-Wen Chen +3 more
openaire +1 more source
Exploring robustness in group key agreement
Proceedings 21st International Conference on Distributed Computing Systems, 2002Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing security services for group communication systems.
Y. Amir +5 more
openaire +1 more source
Key agreement in dynamic peer groups
IEEE Transactions on Parallel and Distributed Systems, 2000As a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity.
M. Steiner, G. Tsudik, M. Waidner
openaire +1 more source
Secure Group Key Agreement Protocols
2018This chapter focusses on Secure Key Exchange protocols executed among a group of parties, called group key exchange (GKE) protocols. Authentication and Key Establishment are very important in any secure communication. Authentication is generally based on long-term keys which can be associated with identities. To associate identities with long-term keys,
Kannan Balasubramanian, Mala K.
openaire +1 more source
Group key agreement efficient in communication
IEEE Transactions on Computers, 2004In recent years, collaborative and group-oriented applications and protocols have gained popularity. These applications typically involve communication over open networks; security thus is naturally an important requirement. Group key management is one of the basic building blocks in securing group communication.
Kim, Y Kim, Yongdae +2 more
openaire +2 more sources
2004
Mit der Verbreitung offener Netze, insbesondere des Internets, fand auch die Gruppenkommunikation eine rasante Verbreitung. Eine Vielzahl heutiger Protokolle sind gruppen-orientiert: angefangen bei Multicast-Diensten in der Netzwerkschicht bis hin zu Videokonferenzsystemen auf der Anwendungsschicht. Alle diese Dienste haben Sicherheitsanforderungen wie
openaire +1 more source
Mit der Verbreitung offener Netze, insbesondere des Internets, fand auch die Gruppenkommunikation eine rasante Verbreitung. Eine Vielzahl heutiger Protokolle sind gruppen-orientiert: angefangen bei Multicast-Diensten in der Netzwerkschicht bis hin zu Videokonferenzsystemen auf der Anwendungsschicht. Alle diese Dienste haben Sicherheitsanforderungen wie
openaire +1 more source
Authenticated Group Key Agreement for Multicast
2006Secure multicast communication provides an efficient way to deliver data to a large group of recipients. Scalability, efficiency and authenticity are the key challenges for secure multicast. In this paper, we propose a novel group key agreement scheme called logical identity hierarchy(LIH) for multicast to support secure communications for large and ...
Liming Wang, Chuan-Kun Wu
openaire +1 more source

