1996
DOI: 10.1007/978-1-5041-2919-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Distributed registration and key distribution (DiRK)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

1998
1998
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…The authors of [32] proposed a similar distributed solution called DiRK (Distributed Registration and Key distribution). These protocols suffer from the 1 affects n phenomenon and bring new challenges such as synchronization and conflict resolution [7].…”
Section: Related Workmentioning
confidence: 99%
“…The authors of [32] proposed a similar distributed solution called DiRK (Distributed Registration and Key distribution). These protocols suffer from the 1 affects n phenomenon and bring new challenges such as synchronization and conflict resolution [7].…”
Section: Related Workmentioning
confidence: 99%
“…In general, a session is defined as either public or private. Both types are defined by the level of session access control required to receive or transmit data within the multicast group [6]. Public sessions are typically encountered on the Internet Multicast Backbone (MBONE) and are supported by the dynamic nature of multicast communications (i.e., knowledge of the multicast address is often the only requirement for membership).…”
Section: Secure Multicast Groupsmentioning
confidence: 99%
“…In order to improve overall system efficiency, the Distributed Registration and Key Distribution (DiRK) protocol distributes linear initial keying and rekey functions among active group members [6]. However, a question of peer trust may arise because the registration and key distribution functions are distributed in such a broad fashion.…”
Section: Key Distribution Architecturesmentioning
confidence: 99%
“…Broadly, the existing key management schemes are categorized as Centralized group key management protocols, which involve a central entity that has the responsibility of distributing the group key to the group members [20,21,5,14,12] . Decentralized group key management protocols, where a group is divided into subgroups, where each group has its own manager [13,6,15] and Distributed group key management protocols, where there is no involvement of any entity, which distributes the group key to the group members [18,2,3]. Each group member participates in the group key generation or it may be done by a single group member.…”
Section: Introductionmentioning
confidence: 99%