Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems: In Association With 10th ACM Conference on Co 2003
DOI: 10.1145/1036921.1036930
|View full text |Cite
|
Sign up to set email alerts
|

Sliding-window self-healing key distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
36
0

Year Published

2007
2007
2010
2010

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 40 publications
(36 citation statements)
references
References 13 publications
0
36
0
Order By: Relevance
“…We compare the proposed scheme with the previous schemes [3,4]. If we assume that the users maintain membership during m sessions from the 1st session, [3] needs 2m + 2δ − 1 storage capacity and [4] needs 3m storage capacity in terms of group members.…”
Section: Performance Analysismentioning
confidence: 99%
See 3 more Smart Citations
“…We compare the proposed scheme with the previous schemes [3,4]. If we assume that the users maintain membership during m sessions from the 1st session, [3] needs 2m + 2δ − 1 storage capacity and [4] needs 3m storage capacity in terms of group members.…”
Section: Performance Analysismentioning
confidence: 99%
“…If we assume that the users maintain membership during m sessions from the 1st session, [3] needs 2m + 2δ − 1 storage capacity and [4] needs 3m storage capacity in terms of group members. However, in the proposed scheme, the members need 2 + δ storage capacity to store private keys over p a j (x), p b j (x) in the j th session and points over β j+1 (x), · · · , β j+δ (x).…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…A number of approaches have been proposed and has grown up in different directions: rekeying schemes for dynamic groups, broadcast schemes with tracing capability, users revocation from a predefined subset of users etc. A few of them are [2,3,5,6,7,8,10,11,13,15,16,17,18,19,20,21,23,24,25,26,27]. However, the underlying networks are assumed to be reliable in all the above works.…”
Section: Introductionmentioning
confidence: 99%