نتایج جستجو برای: rekeying

تعداد نتایج: 186  

Journal: :International journal of Computer Networks & Communications 2013

2004
Weifeng Chen Zihui Ge Chun Zhang James F. Kurose Donald F. Towsley

Subset Difference Revocation (SDR) [7] has been proposed to perform group rekeying in a stateless manner. However, statelessness comes at a cost in terms of key storage and messaging overhead when the number of currently active members is much smaller than the number of potential group members [3]. In this paper, we propose a dynamic SDR scheme to address these two problems. Briefly, rather tha...

2005
Matt Henricksen Ed Dawson

MUGI [15] is a word-based stream cipher designed for 64bit architectures. It uses a 128-bit master key and a 128-bit initialization vector to populate a large non-linear feedback shift register (NLFSR) and additional non-linear state (NLS). In standard benchmarks on 32-bit processors, MUGI suffers from poor key agility because it is implemented on an architecture for which it is not designed, a...

2003
X. Brian Zhang Simon S. Lam Dong-Young Lee

In secure group communications, a key server can deliver a “group-oriented” rekey message [16] to a large number of users efficiently using IP multicast. For reliable delivery, Keystone [17] proposed the use of forward error correction (FEC) in an initial multicast, followed by the use of unicast delivery for users that cannot recover their new keys from the multicast. In this paper, we investi...

Journal: :International Journal on Intelligent Electronic Systems 2009

Journal: :International Journal of Advanced Smart Sensor Network Systems 2012

Journal: :IACR Transactions on Symmetric Cryptology 2020

Journal: :IEICE Transactions 2009
Junbeom Hur Hyunsoo Yoon

Scalability is one of the most important requirements for secure multicast in a multi-group environment. In this study, we propose a decentralized multi-group key management scheme that allows each multicast group sender to control the access to its group communication independently. Scalability is enhanced by local rekeying and inter-working among different subgroups. The group key secrecy and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید