DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shin, Youngjoo | ko |
dc.contributor.author | Hur, Junbeom | ko |
dc.date.accessioned | 2013-03-12T01:54:45Z | - |
dc.date.available | 2013-03-12T01:54:45Z | - |
dc.date.created | 2012-05-29 | - |
dc.date.created | 2012-05-29 | - |
dc.date.issued | 2012 | - |
dc.identifier.citation | WIRELESS NETWORKS, v.18, no.4, pp.413 - 425 | - |
dc.identifier.issn | 1022-0038 | - |
dc.identifier.uri | http://hdl.handle.net/10203/101030 | - |
dc.description.abstract | Multicast is a scalable solution for group communications. In order to offer security for multicast applications, a group key has to be changed whenever a member joins or leaves the group. This incurs 1-affects-n problem, which is a constraint on scalability. Decentralized approaches solve the scalability problem by dividing a group into several subgroups that use independent group keys. These approaches, however, introduce new challenges: problem of trusting third party and inefficiency of data delivery. Proxy encryption is a good approach to solve the problem of trusting third party. In this paper, we propose a novel secure multicast scheme using the proxy cryptography. The proposed scheme provides not only scalability but also data transmission efficiency by dynamic subgrouping of group members while intermediate data-relaying third parties are not required to be trusted. | - |
dc.language | English | - |
dc.publisher | SPRINGER | - |
dc.subject | KEY DISTRIBUTION | - |
dc.subject | MULTICAST | - |
dc.subject | BEHAVIOR | - |
dc.title | Scalable and efficient approach for secure group communication using proxy cryptography | - |
dc.type | Article | - |
dc.identifier.wosid | 000303202000005 | - |
dc.identifier.scopusid | 2-s2.0-84862516726 | - |
dc.type.rims | ART | - |
dc.citation.volume | 18 | - |
dc.citation.issue | 4 | - |
dc.citation.beginningpage | 413 | - |
dc.citation.endingpage | 425 | - |
dc.citation.publicationname | WIRELESS NETWORKS | - |
dc.identifier.doi | 10.1007/s11276-011-0408-x | - |
dc.contributor.nonIdAuthor | Hur, Junbeom | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Multicast | - |
dc.subject.keywordAuthor | Group key management | - |
dc.subject.keywordAuthor | Proxy encryption | - |
dc.subject.keywordAuthor | Data transformation | - |
dc.subject.keywordAuthor | Key transformation | - |
dc.subject.keywordAuthor | Dynamic network | - |
dc.subject.keywordPlus | KEY DISTRIBUTION | - |
dc.subject.keywordPlus | MULTICAST | - |
dc.subject.keywordPlus | BEHAVIOR | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.