2008 International Conference on Computer Science and Software Engineering 2008
DOI: 10.1109/csse.2008.1282
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Group Key Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0
2

Year Published

2010
2010
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 22 publications
0
20
0
2
Order By: Relevance
“…A survey on group key management is given in (Jiang and Hu, 2008) which introduces the security problems in multicast-oriented communication, centralized group key management protocols and analyzes the decentralization group key management. The protocols include member driven CGKMP like the GKMP protocol, LKH protocol, OFT protocol, Centralized Fat table Key Management (CFKM) protocol and time driven protocol.…”
Section: Jcsmentioning
confidence: 99%
“…A survey on group key management is given in (Jiang and Hu, 2008) which introduces the security problems in multicast-oriented communication, centralized group key management protocols and analyzes the decentralization group key management. The protocols include member driven CGKMP like the GKMP protocol, LKH protocol, OFT protocol, Centralized Fat table Key Management (CFKM) protocol and time driven protocol.…”
Section: Jcsmentioning
confidence: 99%
“…So the communications among these members in the group are secure [1]. But there are some problems need to be addressed in Group Key Management (GKM).…”
Section: Introductionmentioning
confidence: 99%
“…Many new protocols are proposed as existing key management protocols are no more suitable for these areas. Jiang and Hu [8] classified current group key management protocols as stateless, self-healing, distributive, reliable, adaptive and mobile-based. Among these protocols reliability and distributiveness are by default provided by the group key management protocols.…”
Section: Current Research Directionsmentioning
confidence: 99%
“…A self-healing protocol can recover certain number of existing and/or future group keys. First, self-healing key distribution protocol [8] was proposed by J.Staddon et.al [25] which is based on polynomials and Angelo [10] provided an efficient self-healing scheme for LKH. Challal et al [7] proposed adaptive group key management protocol and there is need of extensive research should be done in this…”
Section: Current Research Directionsmentioning
confidence: 99%