DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ren, Kui | ko |
dc.contributor.author | Lee, Hyunrok | ko |
dc.contributor.author | Kim, Kwangjo | ko |
dc.contributor.author | Yoo, T | ko |
dc.date.accessioned | 2009-12-29T05:54:40Z | - |
dc.date.available | 2009-12-29T05:54:40Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005 | - |
dc.identifier.citation | INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16009 | - |
dc.description.abstract | Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attacks. The features of ECAKA are as follows: Firstly, EGAKA can be built on any general two-party key exchange protocol without relying on a particular one. EGAKA achieves scalability and robustness in heterogenous environments by allowing members to use any available two-party protocol in common and deliberately designed fault-tolerant mechanism in dynamic membership management. Secondly, EGAKA provides extremely efficient member join services in terms of both communication and computation costs which are constant to the group size. This is a very useful property in the scenarios with frequent member addition. | - |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | SPRINGER-VERLAG BERLIN | - |
dc.subject | EXCHANGE | - |
dc.subject | SECURE | - |
dc.title | Efficient authenticated key agreement protocol for dynamic groups | - |
dc.type | Article | - |
dc.identifier.wosid | 000227471900013 | - |
dc.identifier.scopusid | 2-s2.0-23944520338 | - |
dc.type.rims | ART | - |
dc.citation.volume | 3325 | - |
dc.citation.beginningpage | 144 | - |
dc.citation.endingpage | 159 | - |
dc.citation.publicationname | INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Ren, Kui | - |
dc.contributor.nonIdAuthor | Lee, Hyunrok | - |
dc.contributor.nonIdAuthor | Yoo, T | - |
dc.type.journalArticle | Article; Proceedings Paper | - |
dc.subject.keywordPlus | EXCHANGE | - |
dc.subject.keywordPlus | SECURE | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.