International audienceSecure group communication is an increasingly popular research area having received much attention in recent years. However, most existing approaches construct the group key without caring about the type of the group itself and the environment in which it evolves. This leads to inefficient solutions for real multicast groups. In this paper, we propose a new approach to enhance key management performance. In our solution, we take into consideration group characteristics. We first classify the various group characteristics and point out their influence on the efficiency of key management protocols. We, then, propose two key management protocols, which maintain good performance by adapting the key management process to th...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...
Secure and reliable group communication is an active area of research. The main issue in secure grou...
International audienceGroup key management is an important functional building block for any secure ...
In this paper we describe an efficient algorithm for the management of group keys. Our algorithm is...
Group key management brings challenges on scalability for multicast security. In this paper, we prop...
Group key management is an important functional building block for any secure multicast architecture...
International audienceMulticast routing is an efficient communication mechanism for group-oriented a...
Abstract—Various network applications require sending data onto one or many members, maintaining sec...
Group key management is an important functional building block for any secure multicast architecture...
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However,...
One of the major obstacles for the deployment of multicast is the lack of security. And in multicast...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...
Secure and reliable group communication is an active area of research. The main issue in secure grou...
International audienceGroup key management is an important functional building block for any secure ...
In this paper we describe an efficient algorithm for the management of group keys. Our algorithm is...
Group key management brings challenges on scalability for multicast security. In this paper, we prop...
Group key management is an important functional building block for any secure multicast architecture...
International audienceMulticast routing is an efficient communication mechanism for group-oriented a...
Abstract—Various network applications require sending data onto one or many members, maintaining sec...
Group key management is an important functional building block for any secure multicast architecture...
This work deals with the issue of multicast communication, specifically it focuses on group key mana...
Group communication can benefit from IP multicast to achieve scalable exchange of messages. However,...
One of the major obstacles for the deployment of multicast is the lack of security. And in multicast...
Many emerging network applications (e.g., teleconference, information services, distributed interact...
An ever-increasing number of Internet applications, such as content and software distribution, dista...
[[abstract]]In many network applications, including distant learning, audio webcasting, video stream...
Abstract--Many emerging network applications (e.g., telecon-ference, information services, distribut...