Secure group communication protocols, in particular multi-party key agreement and update algorithms, help pro-mote traditional and new Internet multi-party applications such as video conferencing or distance education. We pro-pose a framework for marrying such approaches with ac-cess management mechanisms and applications in real en-vironments. Furthermore, we extend this framework with anonymisation techniques for the sake of the individual’s privacy. Our solution combines traditional unicast based approaches for privacy with authenticated and encrypted group communication. Thereby, we are able to build closed groups in which the members are not disclosed to outsiders. The introduced secure and anonymous multicast (SAM) framework can be em...
This paper describes a cooperative overlay network that provides anonymous communication services fo...
Providing authentication for the messages exchanged between group members in addition to confidentia...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...
Secure group communication protocols, in particular multi-party key agreement and update algorithms,...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Proposals for multicast security that have been published so far are complex, often require trust in...
This paper introduces a new family of protocols ad-dressing collaborative group key agreement for se...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicast is becoming an increasingly important transmission method on the Internet, since when de...
A large number of applications like multi-player games, video conferencing, chat groups and network ...
Private group communication is an essential requirement of many applications such as real-time stock...
1 Introduction The Internet is used today not only as a global information resource, but also to sup...
In many applications, it is desired to dynamically establish temporary multicast groups for secure m...
Proposals for multicast security that have been published so far are complex, often require trust in...
As collaborative applications become more and more popular the need for appropriate security mechani...
This paper describes a cooperative overlay network that provides anonymous communication services fo...
Providing authentication for the messages exchanged between group members in addition to confidentia...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...
Secure group communication protocols, in particular multi-party key agreement and update algorithms,...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Proposals for multicast security that have been published so far are complex, often require trust in...
This paper introduces a new family of protocols ad-dressing collaborative group key agreement for se...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicast is becoming an increasingly important transmission method on the Internet, since when de...
A large number of applications like multi-player games, video conferencing, chat groups and network ...
Private group communication is an essential requirement of many applications such as real-time stock...
1 Introduction The Internet is used today not only as a global information resource, but also to sup...
In many applications, it is desired to dynamically establish temporary multicast groups for secure m...
Proposals for multicast security that have been published so far are complex, often require trust in...
As collaborative applications become more and more popular the need for appropriate security mechani...
This paper describes a cooperative overlay network that provides anonymous communication services fo...
Providing authentication for the messages exchanged between group members in addition to confidentia...
Nowadays, more and more applications use sensitive and personal information. Subsequently, hiding id...