The paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliability of the re-keying authentication process. We show that the key management in the LKH model is subject to some attacks. In particular, these attacks can be performed by entities external to the multicast group, as well as from internal users of the multicast group. The spectrum of these attacks is spread from the denial of service (DoS) to the session hijack that is the attacker is able to have legitimate users to commit on a session key that is provided by the attacker. The contributions of this paper are: (1) the definition of the threats the LKH key management is subject to; and (2) a reliable key authentication scheme that solves the w...
The most promising protocols for multicast key management are those based on multilevel logical bina...
The most promising protocols for multicast key management are those based on multilevel logical bina...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
This paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliab...
Multicasting has become the main mode communication for providing a wide range of Internet services ...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
Part 9: CryptographyInternational audienceWu et al. proposed a key agreement to securely deliver a g...
Abstract—Multicast communication is becoming the basis for a growing number of applications. It is t...
International audienceMulticast routing is an efficient communication mechanism for group-oriented a...
Abstract — In secure multicast communications, key management schemes are employed to prevent unau-t...
Colloque avec actes et comité de lecture. internationale.International audienceIf multicast communic...
Multicasting is an efficient way to deliver data to large of users in applications such as Internet ...
In Mobile Ad hoc Networks (MANETs) multicasting, when an attacker inserts spurious packets into the ...
The most promising protocols for multicast key management are those based on multilevel logical bina...
The most promising protocols for multicast key management are those based on multilevel logical bina...
The most promising protocols for multicast key management are those based on multilevel logical bina...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
This paper analyzes the Logical Key Hierarchy (LKH) secure multicast protocol focusing on the reliab...
Multicasting has become the main mode communication for providing a wide range of Internet services ...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
Multicast communication is becoming the basis for a growing number of applications. It is therefore ...
Part 9: CryptographyInternational audienceWu et al. proposed a key agreement to securely deliver a g...
Abstract—Multicast communication is becoming the basis for a growing number of applications. It is t...
International audienceMulticast routing is an efficient communication mechanism for group-oriented a...
Abstract — In secure multicast communications, key management schemes are employed to prevent unau-t...
Colloque avec actes et comité de lecture. internationale.International audienceIf multicast communic...
Multicasting is an efficient way to deliver data to large of users in applications such as Internet ...
In Mobile Ad hoc Networks (MANETs) multicasting, when an attacker inserts spurious packets into the ...
The most promising protocols for multicast key management are those based on multilevel logical bina...
The most promising protocols for multicast key management are those based on multilevel logical bina...
The most promising protocols for multicast key management are those based on multilevel logical bina...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...