An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
Security is vital for many multicast-based application and services. Secure group key management is on of the challenging problems for multicast communication with large number of members. Where for each membership variation the group key must be updated and redistributed to all currently active mem...
| Main Authors: | Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IJCSNS
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/41961/ http://irep.iium.edu.my/41961/1/20141107.pdf |
Similar Items
Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication
by: Senan, Shayma, et al.
Published: (2015)
by: Senan, Shayma, et al.
Published: (2015)
A survey on scalable multicasting in mobile ad hoc
networks
by: Qabajeh, Mohammad M., et al.
Published: (2015)
by: Qabajeh, Mohammad M., et al.
Published: (2015)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)
by: Masud, M.H., et al.
Published: (2013)
An enhanced macro mobility management scheme in NEMO environment to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Investigation of gateway placement optimization approaches in wireless mesh networks using genetic algorithms
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Application service delivery in the modern virtualized data center-improving reliability and scalability
by: Raza, A, et al.
Published: (2016)
by: Raza, A, et al.
Published: (2016)
Evaluation of nested network mobility approaches
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2014)
Parameters used in gateway selection schemes for Internet connected MANETs: a review
by: Mahmood, Zainab S., et al.
Published: (2015)
by: Mahmood, Zainab S., et al.
Published: (2015)
Metaheuristic approaches for gateway placement optimization in wireless mesh networks: a survey
by: M. Ahmed, Awadallah, et al.
Published: (2014)
by: M. Ahmed, Awadallah, et al.
Published: (2014)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Performance study of intra-domain mobility management
by: Rusli, Nazreen, et al.
Published: (2005)
by: Rusli, Nazreen, et al.
Published: (2005)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Implementation of direction control algorithms for fixed wings UAV
by: Abdalla, Mohamed K., et al.
Published: (2015)
by: Abdalla, Mohamed K., et al.
Published: (2015)
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
Mobility issues in hierarchical mobile IP
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2005)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
A novel neuroscience-inspired architecture: for computer vision applications
by: Hassan, Marwa Yousif, et al.
Published: (2016)
by: Hassan, Marwa Yousif, et al.
Published: (2016)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
Fixed wings UAV direction control “Hardware Design”
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
by: Khalil Abdallah, Mohamed, et al.
Published: (2015)
Medical emergency and healthcare model: enhancemet with SMS and MMS facilities
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Statistical modeling for speech recognition
by: Khalifa, Othman Omran, et al.
Published: (2013)
by: Khalifa, Othman Omran, et al.
Published: (2013)
Dynamic spectrum allocation scheme for heterogeneous network: BER analysis
by: Othman, Nurzati Iwani, et al.
Published: (2017)
by: Othman, Nurzati Iwani, et al.
Published: (2017)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Trust and resource oriented communication scheme in mobile ad hoc networks
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
A comprehensive analysis of improving the QoS of IMM traffic for high speed wireless campus network
by: Yalli, Jameel Shehu, et al.
Published: (2014)
by: Yalli, Jameel Shehu, et al.
Published: (2014)
Determining watermark embedding strength using complex valued neural network
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2011)
Robust automatic multi-camera viewpoint stabilization using Harris laplace corner detection and spanning tree
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
by: Bhuiyan, Sharif Shah Newaj, et al.
Published: (2018)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
Deep learning for emotional speech recognition
by: Alhamada, M. I., et al.
Published: (2020)
by: Alhamada, M. I., et al.
Published: (2020)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Design and evaluation of network mobility protocol to achieve seamless handoff
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
by: Hassan Abdalla Hashim, Aisha
Published: (2012)
The intention to cyberbully and cyberbullying behaviour among undergraduate students
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
by: Abdul Rashid, Muhammad Shawal, et al.
Published: (2017)
A comprehensive comparative study of MOM for adaptive interoperability communications in service oriented architecture
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
by: Muhamad Ibrahim, Najhan, et al.
Published: (2019)
Similar Items
-
Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication
by: Senan, Shayma, et al.
Published: (2015) -
A survey on scalable multicasting in mobile ad hoc
networks
by: Qabajeh, Mohammad M., et al.
Published: (2015) -
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015) -
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014) -
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)