hrcak mascot   Srce   HID

Izvorni znanstveni članak
https://doi.org/10.2498/cit.1001215

Analysis of Key Management Schemes for Secure Group Communication and Their Classification

R. Aparna
B. B. Amberker

Puni tekst: engleski, pdf (596 KB) str. 203-214 preuzimanja: 487* citiraj
APA 6th Edition
Aparna, R. i Amberker, B.B. (2009). Analysis of Key Management Schemes for Secure Group Communication and Their Classification. Journal of computing and information technology, 17 (2), 203-214. https://doi.org/10.2498/cit.1001215
MLA 8th Edition
Aparna, R. i B. B. Amberker. "Analysis of Key Management Schemes for Secure Group Communication and Their Classification." Journal of computing and information technology, vol. 17, br. 2, 2009, str. 203-214. https://doi.org/10.2498/cit.1001215. Citirano 27.02.2020.
Chicago 17th Edition
Aparna, R. i B. B. Amberker. "Analysis of Key Management Schemes for Secure Group Communication and Their Classification." Journal of computing and information technology 17, br. 2 (2009): 203-214. https://doi.org/10.2498/cit.1001215
Harvard
Aparna, R., i Amberker, B.B. (2009). 'Analysis of Key Management Schemes for Secure Group Communication and Their Classification', Journal of computing and information technology, 17(2), str. 203-214. https://doi.org/10.2498/cit.1001215
Vancouver
Aparna R, Amberker BB. Analysis of Key Management Schemes for Secure Group Communication and Their Classification. Journal of computing and information technology [Internet]. 2009 [pristupljeno 27.02.2020.];17(2):203-214. https://doi.org/10.2498/cit.1001215
IEEE
R. Aparna i B.B. Amberker, "Analysis of Key Management Schemes for Secure Group Communication and Their Classification", Journal of computing and information technology, vol.17, br. 2, str. 203-214, 2009. [Online]. https://doi.org/10.2498/cit.1001215

Sažetak
Secure Group Communication is very critical for applications like board-meetings, group discussions and teleconferencing. Managing a
set of secure group keys and group dynamics are the fundamental building blocks for secure group communication systems. Several
group key management techniques have been proposed so far by many researchers. Some schemes are information theoretic and some are complexity theoretic in nature. Users in the secure group may negotiate with each other to derive a common group key or may
compute the group key on their own. Some schemes involve a trusted Key Distribution Center (KDC), which generates and distributes initial pieces of information, whereas in other schemes users themselves select their private information. Storage at each user and communication cost among members of the group vary from scheme to scheme. Here, in this paper we discuss some of the key management schemes proposed earlier based on the considerations mentioned above. We also analyze the schemes with respect to storage, communication and computation costs.

Hrčak ID: 44860

URI
https://hrcak.srce.hr/44860

Posjeta: 614 *