In secure group communications, there are both rekey and data traffic. We propose to use application-layer multicast to support concurrent rekey and data transport. Rekey traffic is bursty and requires fast delivery. It is desired to reduce rekey bandwidth overhead as much as possible since it competes for bandwidth with data traffic. Towards this goal, we propose a multicast scheme that exploits proximity in the underlying network. We further propose a rekey message splitting scheme to significantly reduce rekey bandwidth overhead at each user access link and network link. We formulate and prove correctness properties for the multicast scheme and rekey message splitting scheme. We have conducted extensive simulations to evaluate our approa...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
A group key management has an important role in multicast security in order to achieve data integrit...
textIn secure group communications, group users share a symmetric key, called group key. The group ...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
IP multicast is an efficient solution for group communication over the Internet, as both the sender ...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Multicasting is an efficient method for transmission and routing of packets to multiple destination...
In this paper we describe an efficient algorithm for the management of group keys. Our algorithm is...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast ...
NoAbstract: Mobile multicast is recently becoming a hot research in the convergence of wireless and...
Security is vital for many multicast-based application and services. Secure group key management is ...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
A group key management has an important role in multicast security in order to achieve data integrit...
textIn secure group communications, group users share a symmetric key, called group key. The group ...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
IP multicast is an efficient solution for group communication over the Internet, as both the sender ...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
Multicasting is an efficient method for transmission and routing of packets to multiple destination...
In this paper we describe an efficient algorithm for the management of group keys. Our algorithm is...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast ...
NoAbstract: Mobile multicast is recently becoming a hot research in the convergence of wireless and...
Security is vital for many multicast-based application and services. Secure group key management is ...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
A group key management has an important role in multicast security in order to achieve data integrit...