Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
298 | Weifeng Chen, Lakshminath R. Dondeti |
Recommendations in Using Group Key Management Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 222-227, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Group rekeying, Stateless rekeying, Network security, Multicast security |
149 | Haibin Lu |
A Novel High-Order Tree for Secure Multicast Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(2), pp. 214-224, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
high-order tree, Group key management, secure multicast, rekeying, dynamic group, balanced tree |
143 | Jin-Hee Cho, Ing-Ray Chen, Mohamed Eltoweissy |
On optimal batch rekeying for secure group communications in wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 14(6), pp. 915-927, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Batch rekeying, Wireless networks, Performance analysis, Key management, Secure group communication |
120 | Abdulhadi Shoufan, Ralf Laue 0002, Sorin A. Huss |
Reliable Performance Evaluation of Rekeying Algorithms in Secure Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2007 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2007), 18-21 June 2007, Helsinki, Finland, Proceedings, pp. 1-8, 2007, IEEE Computer Society, 1-4244-0992-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
106 | Guangming Hu, Xiaohui Kuang, Zhenghu Gong |
A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 344-353, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
106 | Yaser M. Asem, Atsushi Kara |
A Scalable Group Rekeying Scheme using Secret Mask Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 190-195, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
98 | Wade Trappe, Jie Song 0004, Radha Poovendran, K. J. Ray Liu |
Key management and distribution for secure multimedia multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 5(4), pp. 544-557, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
92 | Abdulhadi Shoufan, Ralf Laue 0002, Sorin A. Huss |
High-Flexibility Rekeying Processor for Key Management in Secure Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 822-829, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
92 | Yang Richard Yang, Xiaozhou (Steve) Li, X. Brian Zhang, Simon S. Lam |
Reliable group rekeying: a performance analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 27-31, 2001, San Diego, CA, USA, pp. 27-38, 2001, ACM, 1-58113-411-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
79 | Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau |
Distributed collaborative key agreement and authentication protocols for dynamic peer groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 14(2), pp. 263-276, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic peer groups, security, authentication, group key agreement, secure group communication, rekeying |
78 | Subir Biswas, Md. Mahbubul Haque, Saeed Rashwand, Jelena V. Misic |
Fast, Seamless Rekeying In Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 22-26 June 2009, Montreal, Québec, Canada, pp. 166-171, 2009, IEEE Computer Society, 978-0-7695-3660-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
78 | Hung-Min Sun, Shih-Ying Chang, Shuai-Min Chen, Chien-Chien Chiu |
An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 199-204, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
78 | Tam Pham, Paul Andrew Watters |
The Efficiency of Periodic Rekeying in Dynamic Group Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECUMN ![In: Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 14-16 February 2007, Toulouse, France, pp. 425-432, 2007, IEEE Computer Society, 978-0-7695-2768-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
78 | Abdulhadi Shoufan, Sorin A. Huss, Murtuza Cutleriwala |
A Novel Batch Rekeying Processor Architecture for Secure Multicast Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPEAC ![In: High Performance Embedded Architectures and Compilers, First International Conference, HiPEAC 2005, Barcelona, Spain, November 17-18, 2005, Proceedings, pp. 169-183, 2005, Springer, 3-540-30317-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Melek Önen, Refik Molva |
Group Rekeying with a Customer Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 10th International Conference on Parallel and Distributed Systems, ICPADS 2004, Newport Beach, CA, USA, July 7-9, 2004, pp. 223-229, 2004, IEEE Computer Society, 0-7695-2152-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
78 | Shin-ya Tanaka, Fumiaki Sato |
A Key Distribution and Rekeying Framework with Totally Ordered Multicast Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: The 15th International Conference on Information Networking, ICOIN 2001, Beppu City, Oita, Japan, January 31 - February 2, 2001, pp. 831-842, 2001, IEEE Computer Society, 0-7695-0951-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
65 | Weifeng Chen 0001, Zihui Ge, Chun Zhang, James F. Kurose, Donald F. Towsley |
On Dynamic Subset Difference Revocation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2004, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication, Third International IFIP-TC6 Networking Conference, Athens, Greece, May 9-14, 2004, Proceedings, pp. 743-758, 2004, Springer, 3-540-21959-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Group rekeying, Subset Difference Revocation, Multicast security |
64 | Kuang-Hui Chi, Ji-Han Jiang, Yu-Ching Hsu |
Multigroup Rekeying for a Wireless Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 147-156, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Wensheng Zhang 0001, Guohong Cao |
Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 503-514, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Yong Xu, Yuxiang Sun |
A New Group Rekeying Method in Secure Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 155-160, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
64 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia |
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge, MA, USA, pp. 42-51, 2004, IEEE Computer Society, 0-7695-2208-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Jianwei Chen, Li Xu 0002, Yi Mu 0001 |
A new group rekeying scheme based on t-packing designs for ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 54, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
group rekeying, packing design, ad hoc network, cover-free family |
56 | Kwang-Jin Paek, Jongwan Kim, Chong-Sun Hwang, Ui-Sung Song |
An Energy-Efficient Key Management Protocol For Large-Scale Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 201-206, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Jun Zhang, Fanyuan Ma, Yingcai Bai, Minglu Li 0001 |
Performance Analysis of Batch Rekey Algorithm for Secure Group Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Parallel and Distributed Computing: Applications and Technologies, 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004, Proceedings, pp. 829-832, 2004, Springer, 3-540-24013-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia |
Performance Optimizations for Group Key Management Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 163-, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist, Alfonso Valdes |
Key management and secure software updates in wireless process control environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 100-108, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key management, wireless sensor nodes, process control systems, software updates, rekeying |
51 | B. Parvatha Varthini, S. Valli |
An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 33-43, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
GKC, Logical key Graph, OFT, CRT, Group key, Rekeying |
50 | Rongxing Lu, Xiaodong Lin 0001, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 3243-3248, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood |
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 737-748, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-way hash chains, security, sensor networks, key distribution, secure group communication |
50 | X. Brian Zhang, Simon S. Lam, Dong-Young Lee, Yang Richard Yang |
Protocol design for scalable and reliable group rekeying. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 11(6), pp. 908-922, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
adaptive FEC, proactive FEC, reliable multicast, group key management, secure multicast |
50 | Hojae Hyun, Keecheon Kim, Sunyoung Han |
A Group Key Management Supporting Individual Batch Rekeying and Fault Tolerance for Secure Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part III, pp. 485-494, 2003, Springer, 3-540-40196-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Abdulhadi Shoufan, Sorin A. Huss, Oliver Kelm, Sebastian Schipp |
A Novel Rekeying Message Authentication Procedure Based on Winternitz OTS and Reconfigurable Hardware Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ReConFig ![In: ReConFig'08: 2008 International Conference on Reconfigurable Computing and FPGAs, 3-5 December 2008, Cancun, Mexico, Proceedings, pp. 301-306, 2008, IEEE Computer Society, 978-0-7695-3474-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Winternitz, Security, FPGA, Key Management, Coprocessor, Rekeying |
45 | Weini Zeng, Yaping Lin, Yonghe Lin |
A Distributed Lightweight Group Rekeying Scheme with Speedy Node Revocation for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: MSN 2008, The 4th International Conference on Mobile Ad-hoc and Sensor Networks, Wuhan, China, December 10-12, 2008, pp. 137-144, 2008, IEEE Computer Society, 978-0-7695-3457-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
group rekeying, local collaboration, authentication number chain, sensor network |
45 | Xiaozhou (Steve) Li, Yang Richard Yang, Mohamed G. Gouda, Simon S. Lam |
Batch rekeying for secure group communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, May 1-5, 2001, pp. 525-534, 2001, ACM, 1-58113-348-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
secure group communications, group key management, rekeying |
42 | Minming Li, Ze Feng, Ronald L. Graham, Frances F. Yao |
Approximately Optimal Trees for Group Key Management with Batch Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 4th International Conference, TAMC 2007, Shanghai, China, May 22-25, 2007, Proceedings, pp. 284-295, 2007, Springer, 978-3-540-72503-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin |
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 69, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multicast key management, broadcast encryption |
42 | Jiang Zhang, Jian-Guang Luo, Bin Li, Shiqiang Yang |
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, ICME 2006, July 9-12 2006, Toronto, Ontario, Canada, pp. 1205-1208, 2006, IEEE Computer Society, 1-4244-0367-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Jen-Chiun Lin, Feipei Lai, Hung-Chang Lee |
Efficient Group Key Management Protocol with One-Way Key Derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 336-343, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Josep Pegueroles, Francisco Rico-Novella |
Balanced Batch LKH: New Proposal, Implementation and Performance Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 815-820, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Sandeep S. Kulkarni, Bezawada Bruhadeshwar |
Reducing the Cost of the Critical Path in Secure Multicast for Dynamic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW '02) July 2-5, 2002, Vienna, Austria, Proceedings, pp. 43-48, 2002, IEEE Computer Society, 0-7695-1588-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Shared Keys, Multicast, Group Communication, Critical Path |
37 | Mana Taghdiri, Daniel Jackson 0001 |
A Lightweight Formal Analysis of a Multicast Key Management Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2003, 23rd IFIP WG 6.1 International Conference, Berlin, Germany, September 29 - October 2, 2003, Proceedings, pp. 240-256, 2003, Springer, 3-540-20175-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Lightweight modeling, asynchronous rekeying, formal specification, key management, Alloy, secure multicast |
36 | Victor P. Hubenko Jr., Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert F. Mills, Michael R. Grimaila |
Improving Satellite Multicast Security Scalability by Reducing Rekeying Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 21(4), pp. 51-56, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Wei Yu 0003, Yan Sun 0001, K. J. Ray Liu |
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 4(3), pp. 228-242, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Key Management, Tree Structure |
36 | Yong Wang, Byrav Ramamurthy |
Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 3419-3424, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
36 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia |
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networked Group Communication ![In: Group Communications and Charges; Technology and Business Models, 5th COST264 International Workshop on Networked Group Communications, NGC 2003, and 3rd International Workshop on Internet Charging and QoS Technologies, ICQT 2003, Munich, Germany, September 16-19, 2003, Proceedings, pp. 107-118, 2003, Springer, 3-540-20051-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella |
Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 875-882, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Sencun Zhu, Sushil Jajodia |
Scalable Group Rekeying for Secure Multicast: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2003, 5th International Workshop, Kolkata, India, December 27-30, 2003, Proceedings, pp. 1-10, 2003, Springer, 3-540-20745-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Wai-Pun Ken Yiu, Shueng-Han Gary Chan |
Offering data confidentiality for multimedia overlay multicast: Design and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 5(2), pp. 13:1-13:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance analysis, Key management, overlay multicast, multicast security |
28 | Mohammad Ashiqur Rahaman, Yves Roudier, Andreas Schaad |
Distributed Access Control For XML Document Centric Collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, 15-19 September 2008, Munich, Germany, pp. 267-276, 2008, IEEE Computer Society, 978-0-7695-3373-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Wee Hock Desmond Ng, Michael P. Howarth, Zhili Sun, Haitham S. Cruickshank |
Dynamic Balanced Key Tree Management for Secure Multicast Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 56(5), pp. 590-605, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure group communication, group key management, Multicast security |
28 | B. Parvatha Varthini, S. Valli |
Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCTA ![In: 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), 5-7 March 2007, Kolkata, India, pp. 176-181, 2007, IEEE Computer Society, 978-0-7695-2770-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy |
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(8), pp. 865-882, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design |
28 | Hwa Young Um, Edward J. Delp |
A new secure group key management scheme for multicast over wireless cellular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Hwa Young Um, Edward J. Delp |
A Secure Group Key Management Scheme for Wireless Cellular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 414-419, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Gianluca Dini, Ida Maria Savino |
An Efficient Key Revocation Protocol for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 450-452, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jong-Hyuk Roh, Seunghun Jin, Kyoon-Ha Lee |
Topology-Aware Key Management Scheme for Secure Overlay Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Advances in Data Communications and Wireless Networks, International Conference, ICOIN 2006, Sendai, Japan, January 16-19, 2006, Revised Selected Papers, pp. 733-742, 2006, Springer, 3-540-48563-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Liming Wang, Chuan-Kun Wu |
Authenticated Group Key Agreement for Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings, pp. 55-72, 2006, Springer, 3-540-49462-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Junghyun Nam, Hyunjue Kim, Seungjoo Kim, Dongho Won, Hyungkyu Yang |
Practical and Provably-Secure Multicasting over High-Delay Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part II, pp. 493-501, 2005, Springer, 3-540-26043-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | In Joe Khor, Johnson P. Thomas, Istvan Jonyer |
Sliding Window Protocol for Group Communication in Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Yan Sun 0001, Wade Trappe, K. J. Ray Liu |
A scalable multicast key management scheme for heterogeneous wireless networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 12(4), pp. 653-666, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multicast key management, secure handoff, communication system security, wireless multicast |
28 | Taejoon Park, Kang G. Shin |
LiSP: A lightweight security protocol for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 3(3), pp. 634-660, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
lightweight security, sensor networks, Authentication, key management |
28 | Sahar Mohamed Ghanem, Hussein M. Abdel-Wahab |
A Secure Group Key Management Framework: Design and Rekey Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 797-802, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Young-Chul Shim, Jun-Cheol Park |
Secure Source Specific Multicast for Networks Including Mobile Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part II, pp. 181-190, 2003, Springer, 3-540-40161-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Ohad Rodeh, Kenneth P. Birman, Danny Dolev |
The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(3), pp. 289-319, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
security, Group communication |
28 | Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam |
Secure Group Communications Using Key Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1998 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 31 - September 4, 1998, Vancouver, B.C., Canada, pp. 68-79, 1998, ACM, 1-58113-003-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Kyawt Kyawt Khaing, Khin Mi Mi Aung |
Secured Key Distribution Scheme for Cryptographic Key Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 481-486, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Key Management System, Key Distribution Scheme, Encryption, rekeying |
23 | Ratna Dutta, Sourav Mukhopadhyay |
Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, 5th International Symposium, ISPA 2007, Niagara Falls, Canada, August 29-31, 2007, Proceedings, pp. 419-430, 2007, Springer, 978-3-540-74741-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, self-healing, revocation, rekeying |
23 | Ganapathi Padmavathi, Samukutty Annadurai |
Improved Key Management Technique for Secure Multicasting over IP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 13(3), pp. 293-308, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
rekeying and logical key hierarchy, Multicasting, key management, group key |
23 | Chung Kei Wong, Mohamed G. Gouda, Simon S. Lam |
Secure group communications using key graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 8(1), pp. 16-30, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
security, privacy, multicast, group communications, confidentiality, key distribution, group key management, rekeying |
22 | Payal Sharma, B. R. Purushothama |
A lightweight group key management scheme with constant rekeying cost and public bulletin size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 33(2), pp. 97-120, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu |
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1), pp. 264-308, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu |
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1213, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Hicham Lakhlef, Abdelmadjid Bouabdallah |
Efficient and lightweight group rekeying protocol for communicating things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 91, pp. 107021, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Guanxiong Ha, Hang Chen, Ruiqi Li, Wei Shao, Chunfu Jia |
A Rekeying Scheme for Encrypted Deduplication Storage based on NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EAI Endorsed Trans. Security Safety ![In: EAI Endorsed Trans. Security Safety 8(27), pp. e4, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Heiko Bühler, Andreas Walz, Axel Sikora |
A Mechanism for Seamless Cryptographic Rekeying in Real-Time Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WFCS ![In: 17th IEEE International Conference on Factory Communication Systems, WFCS 2021, Linz, Austria, June 9-11, 2021, pp. 53-58, 2021, IEEE, 978-1-6654-2478-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Heiko Bühler, Andrzej Zbrzezny, Agnieszka M. Zbrzezny, Andreas Walz, Axel Sikora |
Towards a Formal Verification of Seamless Cryptographic Rekeying in Real-Time Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDAACS ![In: 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), Cracow, Poland, September 22-25, 2021, pp. 343-347, 2021, IEEE, 978-1-6654-4209-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Marco Tiloca, Gianluca Dini, Kiki Rizki, Shahid Raza |
Group rekeying based on member join history. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 19(4), pp. 343-381, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Elena Uchiteleva, Ahmed Refaey Hussein, Abdallah Shami |
Lightweight Dynamic Group Rekeying for Low-Power Wireless Networks in IIoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 7(6), pp. 4972-4986, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Bart Mennink |
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1082, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Bart Mennink |
Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, pp. 630-661, 2020, Springer, 978-3-030-64836-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | V. S. Janani, M. S. K. Manikandan |
Dynamic Group Key Management with Efficient Rekeying Schemes for PKI MANET System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Sens. Wirel. Networks ![In: Ad Hoc Sens. Wirel. Networks 43(3-4), pp. 261-281, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Muhammad Arif Mughal, Peng Shi 0006, Ata Ullah, Khalid Mahmood 0004, Muhammad Abid, Xiong Luo |
Logical Tree Based Secure Rekeying Management for Smart Devices Groups in IoT Enabled WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 76699-76711, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | V. S. Janani, M. S. K. Manikandan |
An Efficient Genetic Based Broadcast Stateless Group Key Management Scheme with Dynamic Rekeying in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 105(3), pp. 857-876, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Mustafa Khairallah |
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 888, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Mustafa Khairallah |
Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2019(4), pp. 272-289, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Benedikt Bock, Jan-Tobias Matysik, Konrad-Felix Krentz, Christoph Meinel |
Link Layer Key Revocation and Rekeying for the Adaptive Key Establishment Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WF-IoT ![In: 5th IEEE World Forum on Internet of Things, WF-IoT 2019, Limerick, Ireland, April 15-18, 2019, pp. 374-379, 2019, IEEE, 978-1-5386-4980-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Satyanarayana Vuppala, Alie El-Din Mady, Adam Kuenzi |
Rekeying-based Moving Target Defence Mechanism for Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIoTS ![In: 2019 Global IoT Summit, GIoTS 2019, Aarhus, Denmark, June 17-21, 2019, pp. 1-5, 2019, IEEE, 978-1-7281-2171-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Uma Meena, Anand Sharma |
Secure Key Agreement with Rekeying Using FLSO Routing Protocol in Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 101(2), pp. 1177-1199, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Jing Liu, Minmin Liu, Changji Wang, Shaowen Yao 0001 |
Group Rekeying in the Exclusive Subset-Cover Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 678, pp. 63-77, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Chuan Qin 0009, Jingwei Li 0001, Patrick P. C. Lee |
The Design and Implementation of a Rekeying-Aware Encrypted Deduplication Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 13(1), pp. 9:1-9:30, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Nisha Hooda, Mayank Dave |
Energy Efficient Rekeying Protocol for Wireless Sensor and Actor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UCAmI ![In: Ubiquitous Computing and Ambient Intelligence - 11th International Conference, UCAmI 2017, Philadelphia, PA, USA, November 7-10, 2017, Proceedings, pp. 533-544, 2017, Springer, 978-3-319-67584-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Depeng Li 0002, Srinivas Sampalli |
Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 18(5), pp. 946-959, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Chuan Qin 0009, Jingwei Li 0001, Patrick P. C. Lee |
The Design and Implementation of a Rekeying-aware Encrypted Deduplication Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1607.08388, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Nishat Koti, B. R. Purushothama |
Group-oriented encryption for dynamic groups with constant rekeying cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 9(17), pp. 4120-4137, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Jingwei Li 0001, Chuan Qin 0009, Patrick P. C. Lee, Jin Li 0002 |
Rekeying for Encrypted Deduplication Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016, pp. 618-629, 2016, IEEE Computer Society, 978-1-4673-8891-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | A. John Prakash, V. Rhymend Uthariaraj, Lydia Elizabeth Benjamin |
Efficient Key Management Protocol with Predictive Rekeying for Dynamic Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICGHPC ![In: 2nd International Conference on Green High Performance Computing, ICGHPC 2016, Nagercoil, India, February 26-27, 2016, pp. 1-6, 2016, IEEE, 978-1-4673-6615-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Marco Tiloca, Gianluca Dini |
GREP: A group rekeying protocol based on member join history. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communication, ISCC 2016, Messina, Italy, June 27-30, 2016, pp. 326-333, 2016, IEEE Computer Society, 978-1-5090-0679-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Rajwinder Kaur, Karan Verma |
A Technique to Reduce Problem of Delay in Key Rekeying in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICACDS ![In: Advances in Computing and Data Sciences - First International Conference, ICACDS 2016, Ghaziabad, India, November 11-12, 2016, Revised Selected Papers, pp. 448-456, 2016, Springer, 978-981-10-5426-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | N. Renugadevi, C. Mala |
Pruned nodes in ternary key tree during batch rekeying in group key agreement for cognitive radio ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(18), pp. 4289-4307, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Wei Zhou, Yang Xu 0013, Lijuan Yang, Guojun Wang 0001 |
Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (Workshops and Symposiums) ![In: Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings, pp. 678-690, 2015, Springer, 978-3-319-27160-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|