Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
スポンサーリンク
概要
- 論文の詳細を見る
To control various access privileges in group-oriented applications having multiple data streams, we present a novel reactive key management scheme where each member can obtain the key of a data stream from public parameters only when necessary. Compared with the previous schemes, this scheme significantly reduces the amount of rekey messages for dynamic membership change due to its reactive nature.
- 社団法人電子情報通信学会の論文
- 2007-04-01
著者
-
Yoon Hyunsoo
Korea Advanced Inst. Of Sci. And Technol. (kaist) Kor
-
Yoon Hyunsoo
Cs Division At Kaist
-
LEE Younho
EECS Department at KAIST
-
PARK Yongsu
College of Information and Communications at Hanyang Univ.
-
LEE Younho
CS Division at KAIST
-
KIM Heeyoul
CS Division at KAIST
-
Park Yongsu
College Of Information And Communications Hanyang University
-
Kim Heeyoul
Cs Division Kaist
-
Yoon Hyunsoo
Eecs Department At Kaist
関連論文
- VAMSD : Voronoi Diagram Based Autonomous Mobile Sensor Deployment for Maximizing Coverage
- A Velocity-Based Bicasting Handover Scheme for 4G Mobile Systems
- Improving Handover Quality in 4G Mobile Systems
- Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
- A New Binary Image Authentication Scheme with Small Distortion and Low False Negative Rates(Fundamental Theories for Communications)
- Reactive Key Management Scheme for Access Control in Group Communications(Fundamental Theories for Communications)
- Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment(Application Information Security)
- Handoff Procedure for Seamless Service in IP and OFDM Based 4G Mobile Systems(Mobile Communication, Wireless Technologies and Computational Electromagnetics)
- Securing Mobile Agents by Integrity-Based Encryption(Software Agent and Its Applications)
- Autonomous Clustering Scheme for Wireless Sensor Networks Using Coverage Estimation-Based Self-Pruning(Network, Ubiquitous Networks)
- A Resilient and Efficient Replication Attack Detection Scheme for Wireless Sensor Networks
- A New MAC Protocol for Improving the End-to-End Performance in Multi-Hop Wireless Ad Hoc Networks(Ad Hoc Network)(Networking Technologies for Mobile Internet Systems)
- A Decentralized Multi-Group Key Management Scheme
- An Efficient Mobile Code Authentication Scheme that Permits Overlapping of Execution and Downloading(Networks)
- Sensor Node Localization by Three Mobile Anchors in the Wireless Sensor Networks