2008 International Conference on Information Security and Assurance (Isa 2008) 2008
DOI: 10.1109/isa.2008.68
|View full text |Cite
|
Sign up to set email alerts
|

A Study on an Effective Group Management Scheme for Secure Multicast in MIPv6

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…It got the network performance and happened network overhead too much because of the security resource to provide safe and efficient multicast services and the structure in this model. He also explained his other idea in [Hoon Ko, 2006]. It showed that the distributed/hierarchical scheme minimize the overhead and reduce the number of key and key updating operation than other multicast schemes.…”
Section: Security Problemmentioning
confidence: 99%
“…It got the network performance and happened network overhead too much because of the security resource to provide safe and efficient multicast services and the structure in this model. He also explained his other idea in [Hoon Ko, 2006]. It showed that the distributed/hierarchical scheme minimize the overhead and reduce the number of key and key updating operation than other multicast schemes.…”
Section: Security Problemmentioning
confidence: 99%
“…A common design for key management protocol is to support the security of network, transport and application layer [4]. When a change in group membership occurs, the new key needs to be generated and then sent to all members of the group [5]. It means one user/member can affect all members to be updated, which is referred to 1-affect-n problem.…”
Section: Introductionmentioning
confidence: 99%