Proceedings of the 6th ACM Conference on Computer and Communications Security 1999
DOI: 10.1145/319709.319723
|View full text |Cite
|
Sign up to set email alerts
|

Scalable multicast security in dynamic groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2002
2002
2015
2015

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 47 publications
(15 citation statements)
references
References 4 publications
0
15
0
Order By: Relevance
“…Different controllers are used to manage each subgroup [30]. Some typical schemes include: Scalable Multicast Key Distribution [4], Iolus [26], Dual-Encryption Protocol [15], MARKS [8], Cipher Sequences [27], Kronos [36], Intra-Domain Group Key Management [13], Hydra [31], etc.…”
Section: A Brief Survey Of Related Workmentioning
confidence: 99%
“…Different controllers are used to manage each subgroup [30]. Some typical schemes include: Scalable Multicast Key Distribution [4], Iolus [26], Dual-Encryption Protocol [15], MARKS [8], Cipher Sequences [27], Kronos [36], Intra-Domain Group Key Management [13], Hydra [31], etc.…”
Section: A Brief Survey Of Related Workmentioning
confidence: 99%
“…Cipher Sequences is a proposed framework for multicast security [21], based on Reversible cipher sequence. The multicast tree is rooted at source and the leaves are group members.…”
Section: A) Decentralized Group Key Management Protocolsmentioning
confidence: 99%
“…Molva presented a framework for multicast security [Molva and Pannetrat 1999] that is based on Cipher Sequences (CS). A function f (S, a) is called Cipher Group (CG) if it has the following characteristics: there is a sequence of n elements, such as a 1≤i≤n ; and there is a sequence of n + 1 elements, such as S 0≤i≤n , where…”
Section: Cipher Sequencesmentioning
confidence: 99%