Results 231 to 240 of about 3,013,541 (287)

Key agreement in dynamic peer groups

IEEE Transactions on Parallel and Distributed Systems, 2000
As a result of the increased popularity of group-oriented applications and protocols, group communication occurs in many different settings: from network multicasting to application layer tele- and videoconferencing. Regardless of the application environment, security services are necessary to provide communication privacy and integrity.
M. Steiner, G. Tsudik, M. Waidner
openaire   +3 more sources

Key Exposure Resistant Group Key Agreement Protocol

2021
With the development of the Internet and computer science, the demand for collaboration over the Internet is constantly increasing. The group key agreement (GKA) protocol has been a desirable candidate for this demand. However, the possibility that some parties in the GKA protocol may be tampered with by the adversary leads to the stronger requirement ...
Tianqi Zhou   +4 more
openaire   +1 more source

Tunable Group Key Agreement

32nd IEEE Conference on Local Computer Networks (LCN 2007), 2007
Secure group communication has various applications. Requirements for an application differ in various parameters such as tolerance times for join and leave, arrival rate, departure rate, staying period and group life time. Existing group key agreement protocols do not harness knowledge of application requirements.
INGLE, RAJESH, SIVAKUMAR, G
openaire   +2 more sources

Flexible Robust Group Key Agreement

IEEE Transactions on Parallel and Distributed Systems, 2011
A robust group key agreement protocol (GKA) allows a set of players to establish a shared secret key, regardless of network/node failures. Current constant-round GKA protocols are either efficient and nonrobust or robust but not efficient; assuming a reliable broadcast communication medium, the standard encryption-based group key agreement protocol can
S Jarecki, null Jihye Kim, G Tsudik
openaire   +1 more source

Deniable Group Key Agreement

2006
Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of another party in the protocol? For two party key establishment protocols, a common technique for achieving deniability is the replacement of ...
Jens-Matthias Bohli, Rainer Steinwandt
openaire   +1 more source

EDGAR: Extended Dynamic Group-Key AgReement

2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2010
Secure group communication has been an important research area for a couple of decades. There exists a myriad of algorithms and systems for establishing a group key securely. Nowadays researches focus on the high group dynamics because the mobile ad hoc network and the wireless sensor network are emerging environments; thereby devices have high ...
Jonguk Kim   +3 more
openaire   +1 more source

Group-Based Authentication and Key Agreement

Wireless Personal Communications, 2010
This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes require the SN to interact with the HN for authenticating respective MSs, at the cost of repeated
Yu-Wen Chen   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy