An ever-increasing number of Internet applications, such as content and software distribution, distance learning, multimedia streaming, teleconferencing, and collaborative workspaces, need efficient and secure multicast communication. However, efficiency and security are competing requirements and balancing them to meet the application needs is still an open issue. In this thesis we study the efficiency versus security requirements tradeoffs in group key management for multicast communication. The efficiency is in terms of minimizing the group rekeying cost and the key storage cost, while security is in terms of achieving backward secrecy, forward secrecy, and resistance to collusion. We propose two new group key management schemes that bal...
The problem of distributing multimedia securely over the Internet is often viewed as an instance of ...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
Multicast communication experiences recipient get to issue due to forward secrecy, backward secrecy....
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
[[abstract]]Recently, many group communication services have become the focus for future development...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
Key management plays a vital role in the data communications. The proposed scheme is a key managemen...
Abstract—Various network applications require sending data onto one or many members, maintaining sec...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...
The communication sector is flourishing in many ways, leading to a growing number of users and syste...
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However,...
International audienceMulticast routing is an efficient communication mechanism for group-oriented a...
In this paper we describe an efficient algorithm for the management of group keys. Our algorithm is...
The problem of distributing multimedia securely over the Internet is often viewed as an instance of ...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
Multicast communication experiences recipient get to issue due to forward secrecy, backward secrecy....
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
[[abstract]]Recently, many group communication services have become the focus for future development...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
Key management plays a vital role in the data communications. The proposed scheme is a key managemen...
Abstract—Various network applications require sending data onto one or many members, maintaining sec...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...
The communication sector is flourishing in many ways, leading to a growing number of users and syste...
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However,...
International audienceMulticast routing is an efficient communication mechanism for group-oriented a...
In this paper we describe an efficient algorithm for the management of group keys. Our algorithm is...
The problem of distributing multimedia securely over the Internet is often viewed as an instance of ...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
Multicast communication experiences recipient get to issue due to forward secrecy, backward secrecy....