Filters








129,693 Hits in 4.9 sec

Secure group communications using key graphs

Chung Kei Wong, Mohamed Gouda, Simon S. Lam
<span title="1998-10-01">1998</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/g4bof3rzarbpjigq5zxjkozv2u" style="color: black;">Computer communication review</a> </i> &nbsp;
., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e.  ...  We then introduce key graphs to specify secure groups.  ...  a secure group (U, K, R) whose key graph G is a single-root tree.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/285243.285260">doi:10.1145/285243.285260</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/psgayvxzonajlbkog62q4yqvke">fatcat:psgayvxzonajlbkog62q4yqvke</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040723083129/http://www.cs.utexas.edu:80/users/lam/Vita/ACM/WGL98.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/54/11549b6aa1cb459e0f641daa1e8cc104a1374e1a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/285243.285260"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Secure group communications using key graphs

Chung Kei Wong, M. Gouda, S.S. Lam
<span title="">2000</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wn5qtqh7ejhpfdjtrxhija73bq" style="color: black;">IEEE/ACM Transactions on Networking</a> </i> &nbsp;
We then introduce key graphs to specify secure groups.  ...  For a special class of key graphs, we present three strategies for securely distributing rekey messages after a join/leave and specify protocols for joining and leaving a secure group.  ...  From Table III , it is obvious that complete key graphs should not be used. On the other hand, scalable group key management can be achieved by using tree key graphs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/90.836475">doi:10.1109/90.836475</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/76qllpo5vzdidbgmhxj7p5cxv4">fatcat:76qllpo5vzdidbgmhxj7p5cxv4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070221184448/http://www.cs.utexas.edu:80/users/lam/Vita/IEEE/WGL00.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d2/49/d249fd915c0748ed33580043f07becd04b262afa.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/90.836475"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Secure group communications using key graphs

Chung Kei Wong, Mohamed Gouda, Simon S. Lam
<span title="">1998</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6mtaqkuatjbxjnu4pbbyvwphgi" style="color: black;">Proceedings of the ACM SIGCOMM &#39;98 conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM &#39;98</a> </i> &nbsp;
., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communications model, i.e.  ...  We then introduce key graphs to specify secure groups.  ...  a secure group (U, K, R) whose key graph G is a single-root tree.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/285237.285260">doi:10.1145/285237.285260</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sigcomm/WongGL98.html">dblp:conf/sigcomm/WongGL98</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4beesxoinravfgbmaqaca3nl6m">fatcat:4beesxoinravfgbmaqaca3nl6m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040723083129/http://www.cs.utexas.edu:80/users/lam/Vita/ACM/WGL98.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/11/54/11549b6aa1cb459e0f641daa1e8cc104a1374e1a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/285237.285260"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Implementing Secure Group Communications using Key Graphs
English

Ch. Aswani Kumar, R. Sri Lakshmi, M. Preethi
<span title="2007-03-23">2007</span> <i title="Defence Scientific Information and Documentation Centre"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sbz4qubtlrhx5a2wpmby2l2qfu" style="color: black;">Defence Science Journal</a> </i> &nbsp;
In this paper, the secure group communications using key graphs and the implementation of a different hierarchical approach to improve the scalability and secure group communication using key graphs has  ...  While the technical issues of securing unicast communications for client-server computing are fairly well-understood, the technical issues of securing group communications are not.  ...  manner to securing group communications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/dsj.57.1755">doi:10.14429/dsj.57.1755</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6krzafdf6jfnnfm3orgtu3dm24">fatcat:6krzafdf6jfnnfm3orgtu3dm24</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030044638/http://publications.drdo.gov.in/ojs/index.php/dsj/article/download/1755/851" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/58/97/5897711fe6d580c6e6a2b303e921693fbe004dae.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.14429/dsj.57.1755"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Key Predistribution for Heterogeneous Group of Sensor Nodes using Combinatorial Design

Monjul Saikia, Irani Acharjamayum, Anwar Hussain
<span title="2017-02-01">2017</span> <i title="Indian Society for Education and Environment"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wffwpj3q45g5zfjzfeyagk5uea" style="color: black;">Indian Journal of Science and Technology</a> </i> &nbsp;
Methods/Statistical analysis: Methodology used here is based on theory of balanced incomplete block design where a group of BIBD is used for each of the sensor groups and keys are distributed based on  ...  Objective: To design a key pre-distribution scheme for a heterogeneous group of sensor nodes with the help of combinatorial design for high resilience against node capture.  ...  Figure 8 . 8 An Intersection Graph/Secure Communication based on Key Graph and Communication Graph. Figure 9 . 9 A graph on Hop Count. Figure 10 . 10 A graph on Connectivity Probability.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2017/v10i22/112056">doi:10.17485/ijst/2017/v10i22/112056</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jp5e36izhba2dmzgxp6saessi4">fatcat:jp5e36izhba2dmzgxp6saessi4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180720083832/http://www.indjst.org/index.php/indjst/article/download/112056/80526" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17485/ijst/2017/v10i22/112056"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Space-Efficient Keying in Wireless Communication Networks

Neeraj Mittal
<span title="">2007</span> <i title="IEEE"> Third IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2007) </i> &nbsp;
The key that two nodes should use to securely communicate with each other is derived from at most log n keys and can be computed in O(log n) time.  ...  We investigate the problem of assigning keys to nodes in a network such that each node is able to communicate with every other node in a secure manner.  ...  We then use this scheme as a subroutine to derive an efficient solution to the secure key assignment problem when the communication graph is the complete graph.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wimob.2007.4390869">doi:10.1109/wimob.2007.4390869</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/wsq6bzy4ivavxdalvrg6gl4cei">fatcat:wsq6bzy4ivavxdalvrg6gl4cei</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922034836/http://www.utdallas.edu/%7Enxm020100/publications/conferences/space-key.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/50/29/5029d469e1b2a8aac5d89dfce72753ddd6a97e9c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wimob.2007.4390869"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Securing Group Communication in Partially Distributed Systems

Pankesh Bamotra
<span title="">2012</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
We use a hierarchical approach to represent the partial distributed structure of the distributed system using key graphs.  ...  The outcome is a secure group communication providing authenticity, confidentiality and integrity of messages delivered between groups.  ...  We use two functions associated with each secure group. The tree key graphs are a special case of this key graphs in which there is only a single root.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-0523640">doi:10.9790/0661-0523640</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/54mlhdsprjht5d7p622ykcpvqu">fatcat:54mlhdsprjht5d7p622ykcpvqu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602031352/http://www.iosrjournals.org/iosr-jce/papers/Vol5-issue2/F523640.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3e/d0/3ed00f3dcbeea1d03ca6012781b5f80474215c56.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-0523640"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Group Communication with Low Communication Overhead using Effective Multicasting

<span title="">2017</span> <i title="Sryahwa Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mj2wzfl5ljbmfowz6caca7n26y" style="color: black;">International Journal of Emerging Engineering Research and Technology</a> </i> &nbsp;
The protocol is based upon the use of key trees for secure group and periodic batch rekeying.  ...  In this paper we proposed a protocol with a lower communication cost for secure group key management called "N-Sec Cumulative Rekeying Protocol".  ...  New session key is communicated to the remaining members in a secure manner.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22259/ijeert.0504002">doi:10.22259/ijeert.0504002</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fbb37kf3nfevvfivh2cwvrfude">fatcat:fbb37kf3nfevvfivh2cwvrfude</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180609074521/http://ijeert.org/papers/v5-i4/2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/9b/06/9b0674d60118ac5f4c0458cb042829638654716c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.22259/ijeert.0504002"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Optimal Communication Complexity of Generic Multicast Key Distribution

D. Micciancio, S. Panjwani
<span title="">2008</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/wn5qtqh7ejhpfdjtrxhija73bq" style="color: black;">IEEE/ACM Transactions on Networking</a> </i> &nbsp;
We prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager for rekeying the group are obtained by arbitrarily nested application  ...  Our lower bound shows that the amortized cost of updating the group key for a secure multicast protocol (measured as the number of messages transmitted per membership change) is log 2 (n) + o(1).  ...  Since the old group key can no longer be used to secure communication, communicating a new key seemingly requires unicasting the new key individually to all group members (e.g., as advocated in [10, 9  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnet.2007.905593">doi:10.1109/tnet.2007.905593</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/j4wnuklrkfetpcpsoihh3tn5di">fatcat:j4wnuklrkfetpcpsoihh3tn5di</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150429202346/http://iacr.org/archive/eurocrypt2004/30270154/final.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d1/0f/d10f58f6519f0173fe8369fbd46499e71aac592e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tnet.2007.905593"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Optimal Communication Complexity of Generic Multicast Key Distribution [chapter]

Daniele Micciancio, Saurabh Panjwani
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We prove a tight lower bound for generic protocols for secure multicast key distribution where the messages sent by the group manager for rekeying the group are obtained by arbitrarily nested application  ...  Our lower bound shows that the amortized cost of updating the group key for a secure multicast protocol (measured as the number of messages transmitted per membership change) is log 2 (n) + o(1).  ...  Since the old group key can no longer be used to secure communication, communicating a new key seemingly requires unicasting the new key individually to all group members (e.g., as advocated in [10, 9  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-24676-3_10">doi:10.1007/978-3-540-24676-3_10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fzavr2rbdrhjbmqusw2oajbia4">fatcat:fzavr2rbdrhjbmqusw2oajbia4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030095640/https://link.springer.com/content/pdf/10.1007%2F978-3-540-24676-3_10.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e5/03/e503f70ce0358152888f097866b39c619754e997.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-24676-3_10"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

UML-based modeling and formal verification of security protocols

Sara Mota, Benjamin Fontan
<span title="">2005</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jcgktu6pa5g3lncohtnbgbk4im" style="color: black;">Proceedings of the 2005 ACM conference on Emerging network experiment and technology - CoNEXT&#39;05</a> </i> &nbsp;
Keys will be used to guarantee security services during group communication. • Inter group: Activities between groups as merging and splitting groups.  ...  III Ongoing work: SAFECAST, a secure group Communication Specification, modeling and verification of secure group communication protocols are the next step in our work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1095921.1095981">doi:10.1145/1095921.1095981</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/conext/MotaF05.html">dblp:conf/conext/MotaF05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bpqfmq2hv5dflg6pa7qryes77a">fatcat:bpqfmq2hv5dflg6pa7qryes77a</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808095926/https://homepages.laas.fr/owe/SecVerif/DOC/ConextSTUSMotaBFontan.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f3/2e/f32efad57abe6877d3f92dad801ef52c7d44cc96.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1095921.1095981"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Key Management Systems for Smart Grid Advanced Metering Infrastructure: A Survey [article]

Amrita Ghosal, Mauro Conti
<span title="2018-05-31">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
This survey work highlights the key security issues of advanced metering infrastructures and focuses on how key management techniques can be utilized for safeguarding AMI.  ...  Then, we introduce the security issues and challenges of AMI. We also provide a classification of the existing works in literature that deal with secure key management system in AMI.  ...  The first one secures unicast communication between MDMS and SMs, while the second is used for generating the multi-group key graph for secure multicast communications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.00121v1">arXiv:1806.00121v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kbbuv36djnby3i4rlm4fapw2ja">fatcat:kbbuv36djnby3i4rlm4fapw2ja</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200913134452/https://arxiv.org/pdf/1806.00121v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/38/02/3802c58a0d1e4776c8d45b44c9f82552d6b966b4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1806.00121v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Scalable Multi-group Key Management for Advanced Metering Infrastructure

Mourad Benmalek, Yacine Challal, Abdelmadjid Bouabdallah
<span title="">2015</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/eksz6udvbjavvlbt4ho3tdsi6q" style="color: black;">2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing</a> </i> &nbsp;
It is a key management scheme that can support unicast, multicast and broadcast communications based on an efficient multi-group key graph technique.  ...  In this paper, we propose a new Scalable multi-group key management for AMI (SAMI) to secure data communications in an Advanced Metering Infrastructure.  ...  The first one is to secure unicast communications between MDMS and the SMs, and in the other one they are used for generating the multigroup key graph for secure multicast communications.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cit/iucc/dasc/picom.2015.27">doi:10.1109/cit/iucc/dasc/picom.2015.27</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/IEEEcit/BenmalekCB15.html">dblp:conf/IEEEcit/BenmalekCB15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4j43dinni5earhwufcb7tybfaa">fatcat:4j43dinni5earhwufcb7tybfaa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190426121444/https://hal.archives-ouvertes.fr/hal-01308928/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/47/28/47284595611b32142194c101d8b0e5e7fb47b1ec.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/cit/iucc/dasc/picom.2015.27"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

MK-AMI: Efficient multi-group key management scheme for secure communications in AMI systems

Mourad Benmalek, Yacine Challal
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xu3nssyjojgz5moccrokj4jz7q" style="color: black;">2016 IEEE Wireless Communications and Networking Conference</a> </i> &nbsp;
This paper proposes a new efficient Multi-group Key management for AMI (MK-AMI) to secure data communications in the smart grid.  ...  An analysis of security and performance, and a comparison of our scheme with recently proposed schemes illustrate that MK-AMI achieves efficient key management and induces low storage and communications  ...  Theses individual keys (refreshed periodically) will be used to secure unicast communications, and to generate the multigroup key graph for secure multicast communications. • The MDMS must generate a group  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wcnc.2016.7565124">doi:10.1109/wcnc.2016.7565124</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/wcnc/BenmalekC16.html">dblp:conf/wcnc/BenmalekC16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zspupotdmje53dfhrowfuugicm">fatcat:zspupotdmje53dfhrowfuugicm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922083435/https://hal.archives-ouvertes.fr/hal-01308939/document" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/91/e9/91e9eb3f890714cf885790679d3fd0dc51da9763.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/wcnc.2016.7565124"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Analysis of Security methods in Internet of Things

Saranya C
<span title="">2015</span> <i title="Auricle Technologies, Pvt., Ltd."> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/xzi23k3yufelpolr4dcpkbpjke" style="color: black;">International Journal on Recent and Innovation Trends in Computing and Communication</a> </i> &nbsp;
In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated  ...  communication that can be applied in IoT environment.  ...  Devices which are not in the member of group cannot communicate with other groups or devices. TGCA consists of 4 modules.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17762/ijritcc2321-8169.150446">doi:10.17762/ijritcc2321-8169.150446</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/cx7woa2b7jhwjgl2gxofbv5j7i">fatcat:cx7woa2b7jhwjgl2gxofbv5j7i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602014610/http://www.ijritcc.org/download/1429528713.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/69/e7/69e7e0be10eda0e16bce8aed8acfe6a1d9c48cfb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.17762/ijritcc2321-8169.150446"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 129,693 results