IEEE MILCOM 2004. Military Communications Conference, 2004.
DOI: 10.1109/milcom.2004.1495143
|View full text |Cite
|
Sign up to set email alerts
|

Using key trees for securing military multicast communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The next operation corresponds to subtractive sub group operations, referred to as group partition. Existing studies deal with group communication security requirements that force management to prevent new users from reading communications from the past and departed users from reading future communication [11], [12]. Our group communication security requirements force the management of session-based dynamic group keys.…”
Section: Introductionmentioning
confidence: 99%
“…The next operation corresponds to subtractive sub group operations, referred to as group partition. Existing studies deal with group communication security requirements that force management to prevent new users from reading communications from the past and departed users from reading future communication [11], [12]. Our group communication security requirements force the management of session-based dynamic group keys.…”
Section: Introductionmentioning
confidence: 99%
“…It discovers IPsec capable devices and configures them in an automated way. The second component is the multicast Internet key ex-change protocol (MIKE) [5,9,18]. It negotiates and establishes a group key in a secure manner.…”
Section: Introductionmentioning
confidence: 99%