Proceedings. Sixth IEEE Symposium on Computers and Communications
DOI: 10.1109/iscc.2001.935354
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic group communication security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Baal protocol was proposed [6]. It defines three types of nodes: (i) the group controller GC that maintains a participant list PL, announces the secure session and distributes the TEK to the members via local controllers.…”
Section: Related Workmentioning
confidence: 99%
“…Baal protocol was proposed [6]. It defines three types of nodes: (i) the group controller GC that maintains a participant list PL, announces the secure session and distributes the TEK to the members via local controllers.…”
Section: Related Workmentioning
confidence: 99%
“…A common approach to key management in multicast networks is the use of hierarchy by delegating the group key management to local controllers or partitions which multicast the re-keying message to all group members [1] [6] [7] [12]. A secure channel for key distribution within a group is proposed in [11].…”
Section: Key Management In Secured Multicast Networkmentioning
confidence: 99%