15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed C 2014
DOI: 10.1109/snpd.2014.6888676
|View full text |Cite
|
Sign up to set email alerts
|

An efficient structure for LKH key tree on secure multicast communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
4
0
1
Order By: Relevance
“…The second technique is the noncentralized key distribution that divides a single network into multiple clusters and performs key management on each cluster. Furthermore, Burmester and Desmedt [6], Guo and Zhang [7], Wu et al [8], Li and Xu [9], and Sakamoto [10] advanced the study on noncentralized key distribution. However, the key management procedure is complicated when dividing the network into subnetworks and operating the KDC for each subnetwork.…”
Section: Related Workmentioning
confidence: 99%
“…The second technique is the noncentralized key distribution that divides a single network into multiple clusters and performs key management on each cluster. Furthermore, Burmester and Desmedt [6], Guo and Zhang [7], Wu et al [8], Li and Xu [9], and Sakamoto [10] advanced the study on noncentralized key distribution. However, the key management procedure is complicated when dividing the network into subnetworks and operating the KDC for each subnetwork.…”
Section: Related Workmentioning
confidence: 99%
“…Thereon, the mechanism called Central Authorized Key Extension (CAKE [10]) is used to realize encrypted group communication. It utilizes the idea of Secure Lock [6] for compressing secured information into a single cipher and enhances its performance by the combination with a logical key hierarchy (LKH [19]) and new concepts for managing keys.…”
Section: Introductionmentioning
confidence: 99%
“…Thereon, the mechanism called Central Authorized Key Extension (CAKE [10]) is used to realize encrypted group communication. It utilizes the idea of Secure Lock [6] for compressing secured information into a single cipher and enhances its performance by the combination with a logical key hierarchy (LKH [19]) and new concepts for managing keys.…”
Section: Introductionmentioning
confidence: 99%