2018
DOI: 10.1007/s12652-018-0678-6
|View full text |Cite
|
Sign up to set email alerts
|

Software-defined security controller-based group management and end-to-end security management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…A centralized key management approach for the group that uses Diffie-Hellman for generating the key-encryption key is proposed in [40]. The group key can be decrypted using the key-encryption key.…”
Section: Group Key Management Techniquesmentioning
confidence: 99%
“…A centralized key management approach for the group that uses Diffie-Hellman for generating the key-encryption key is proposed in [40]. The group key can be decrypted using the key-encryption key.…”
Section: Group Key Management Techniquesmentioning
confidence: 99%
“…In [14] proposes high-intensity tree-based authenticated key agreement solution. The Diffie-Hellman analysis is used to identify an intermediary key that use the security support efficient and the adjoining paired node's blinded secret.…”
Section: Related Workmentioning
confidence: 99%
“…In SDN, the control plane is implemented in a logically centralized controller, simplifying the policy enforcement and network function configuration. The centralized network controller in the control plane manages the intelligence and state of the entire network for the network functions such as security management and mobility management [15,16]. However, the current network legacy devices are not yet ready to implement the horizontal model [17,18,19,20].…”
Section: Introductionmentioning
confidence: 99%