최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보과학회논문지. Journal of KIISE. 정보통신, v.36 no.6, 2009년, pp.471 - 480
허준범 (한국과학기술원 전산학과) , 윤현수 (한국과학기술원 전산학과)
One of the principal impediments to the achievement of a scalable access control for a large number of subscribers in a public broadcast is to distribute key update messages reliably to all stateless receivers. However, in a public broadcast, the rekeying messages can be dropped or compromised durin...
A. Perrig, J. D. Tygar, Secure Broadcast Communication in Wired and Wireless networks, Springer-Verlag, 2002
A. Fiat and M. Naor, "Broadcast Encryption," Proc. CRYPTO 1993, Lecture Notes in Computer Science, vol.773, pp.480-491, 1993
D. Naor, M. Naor, and J. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. CRYPTO 2001, Lecture Notes in Computer Science, vol.2139, pp.41-62, 2001
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications Using Key Graphs," ACM SIGCOMM, pp.68-79, 1998
D. A. McGrew and A. T. Sherman, "Key Establishment in Large Dynamic Groups Using One-way Function Trees," Tech. Rep. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md
R. Canetti, J. Garay, G. Itkis, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," Proceedings of IEEE INFOCOM 1999, pp.708-716
A. Perrig, D. Song, and J. D. Tygar, "ELK, a New Protocol for Efficient Large-Group Key Distribution," Proceedings of IEEE Symposium on Security and Privacy, pp.247-262, 2001
C. Blundo, Luiz A. Frota Mattos, and D. R. Stinson, "Generalized Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution,'' Theoretical Computer Science, vol.200, no.1-2, pp.313-334, 1998
S. Rafaeli, D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol.35, no.3, pp.309-329, 2003
M. Steiner, G. Tsudik, and M. Waidner, "Cliques: A New Approach to Group Key Agreement," Proc International Conference on Distributed Computing Systems, pp.380-387, 1998
T. Hardjono and L. R. Dondeti, Multicast and Group Security, first ed., Artech House, 2003
D. Halevy and A. Shamir, "The LCD Broadcast Encryption Scheme," Proc CRYTO 2002, Lecture Notes in Computer Science, vol.2442, pp.47-60, 2002
M. J. MihaIjevic, "Reconfigurable Key Management for Broadcast Encryption," IEEE Communications Letters, vol.8, no.7, pp.440-442, 2004
C. Blundo, P. D'Arco, and A. D. Santis, "On Self-Healing Key Distributions Schemes," IEEE Transactions on Information Theory, vol.52, no.12, pp.5455-5467, 2006
http://www.cryptopp.com/benchmarks.html, Crypto++ 5.5 Benchmarks
T. Krovetz, "Message Authentication on 64-bit Architectures," Selected Areas of Cryptography, Springer, 2006
M. Abdalla, Y. Shavitt, and A. WooI, "Key Management for Restricted Multicast Using Broadcast Encryption," IEEE/ACM Transactions on Networking, vol.8, no.4, pp.443-454, 2000
※ AI-Helper는 부적절한 답변을 할 수 있습니다.