2009
DOI: 10.1002/ett.1389
|View full text |Cite
|
Sign up to set email alerts
|

Analytical modelling of users' behaviour and performance metrics in key distribution schemes

Abstract: SUMMARYAccess control for group communications must ensure that only legitimate users can access the authorised data streams. This could be done by distributing an encrypting key to each member of the group to be secured. To achieve a high level of security, the group key should be changed every time a user joins or leaves the group, so that a former group member has no access to current communications and a new member has no access to previous communications. Since group memberships could be very dynamic, the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Many schemes have been proposed to defend malicious attacks, for example, trust management [9] and encryption key schemes [10,11]. In [12], Mohi et al proposed a technique known as spontaneous watchdogs, which adopts both local and global agents to watch over communications.…”
Section: Related Workmentioning
confidence: 99%
“…Many schemes have been proposed to defend malicious attacks, for example, trust management [9] and encryption key schemes [10,11]. In [12], Mohi et al proposed a technique known as spontaneous watchdogs, which adopts both local and global agents to watch over communications.…”
Section: Related Workmentioning
confidence: 99%
“…We earlier proposed an anonymous authentication scheme that is suitable for group communication scenarios with a server centre and several group members. Furthermore, our authentication protocol can be applied to achieve more complex goals if combined with other primitive protocols, such as session key exchange, key distribution, secret sharing and directly secure group communication.…”
Section: Applicationmentioning
confidence: 99%
“…Human behavior is complex phenomenon and depends upon many different aspects. But it can be reasonably argued that users of a particular system and services show identifiable patterns, which can be inferred by using extended‐user activity measurements , and user behavior can be analytically modeled . Our goal in this paper is to use the already established parameters of user behavior in a particular context for estimation of QoE.…”
Section: Introductionmentioning
confidence: 99%