Dynamic batch rekeying scheme using multiple logical key trees for secure multicast communication
A group key management has an important role in multicast security in order to achieve data integrity and confidentiality. Key trees are ideal for a group of users to efficiently and securely share a common secret key, the group key, which can encrypt transmitted data, or other session keys that pro...
| Main Authors: | Senan, Shayma, Hassan Abdalla Hashim, Aisha, Othman, Raihan, Az Eddine, Azeddin, Zeki, Akram M. |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/48242/ http://irep.iium.edu.my/48242/1/48242.pdf http://irep.iium.edu.my/48242/4/48242_%20Dynamic%20batch%20rekeying_scopus.pdf |
Similar Items
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
by: Zakaria, Omar, et al.
Published: (2014)
by: Zakaria, Omar, et al.
Published: (2014)
Introduction to mobility multicast schemes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Multicast-unicast key management scheme in IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014)
by: Mehdizadeh, Abbas, et al.
Published: (2014)
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012)
by: Ali, Sellami, et al.
Published: (2012)
Performance aAnalysis of HRO-B+ scheme for the nested mobile networks using OPNet
by: Shayma, Senan, et al.
Published: (2017)
by: Shayma, Senan, et al.
Published: (2017)
Hierarchical route optimization scheme using advanced binding update list (BUL+) for nested mobile networks
by: Shayma, Senan, et al.
Published: (2017)
by: Shayma, Senan, et al.
Published: (2017)
The study of multicast hierarchical mobile IPV6
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2011)
Performance analysis of HRO-B+ scheme for the nested mobile networks using OPNet
by: Senan, Shayma, et al.
Published: (2014)
by: Senan, Shayma, et al.
Published: (2014)
A tree-based QoS multicast routing protocol for MANETs
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
Introduction to mobility management
by: Senan, Shayma, et al.
Published: (2011)
by: Senan, Shayma, et al.
Published: (2011)
Nested mobile networks
by: Senan, Shayma, et al.
Published: (2011)
by: Senan, Shayma, et al.
Published: (2011)
Evaluation of NEMO extensions
by: Senan, Shayma, et al.
Published: (2011)
by: Senan, Shayma, et al.
Published: (2011)
Handoff process in micromobility protocols
by: Senan, Shayma, et al.
Published: (2011)
by: Senan, Shayma, et al.
Published: (2011)
Comparison between network simulators
by: Senan, Shayma, et al.
Published: (2011)
by: Senan, Shayma, et al.
Published: (2011)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Scalable rekeying algorithm in IEEE 802.16e
by: Gilanian Sadeghi, Mohammad Mehdi, et al.
Published: (2011)
by: Gilanian Sadeghi, Mohammad Mehdi, et al.
Published: (2011)
Scalable rekeying algorithm in IEEE 802.16e
by: Sadeghi, Mohammad Mehdi Gilanian, et al.
Published: (2011)
by: Sadeghi, Mohammad Mehdi Gilanian, et al.
Published: (2011)
An approach to enhance aggregated source specific multicast scheme
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2008)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win Lye, et al.
Published: (2005)
by: Aye, Win Lye, et al.
Published: (2005)
A framework of a route optimization scheme for nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Analytical evaluation of a new route pptimization scheme for nested mobile network
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2013)
Analytical evaluation of a new route optimization scheme for nested mobile network
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2012)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2012)
Route optimization scenario of a new scheme based on nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
Analytical evaluation of a new route optimization scheme for nested mobile network
by: Senan, Shayma, et al.
Published: (2012)
by: Senan, Shayma, et al.
Published: (2012)
An approach to enhance aggregated source specific multicast scheme
by: Aisha-Hassan A. Hashim,, et al.
Published: (2008)
by: Aisha-Hassan A. Hashim,, et al.
Published: (2008)
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
by: Al‐Sharafi, Ali Mohammed Ali
Published: (2008)
by: Al‐Sharafi, Ali Mohammed Ali
Published: (2008)
IP multicast
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
Modeling of efficient key management method in multicast networks.
by: Mehdizadeh, Abbas, et al.
by: Mehdizadeh, Abbas, et al.
Introduction to multicast mobility management
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Multicast security : issues and solutions
by: Qabajeh, Mohammad M., et al.
Published: (2011)
by: Qabajeh, Mohammad M., et al.
Published: (2011)
A comparative study of source specific multicast and aggregated source specific multicast
by: Ahmad, Taqiyuddi, et al.
Published: (2008)
by: Ahmad, Taqiyuddi, et al.
Published: (2008)
Application of multimedia in e-books system
by: Zeki, Akram M., et al.
Published: (2015)
by: Zeki, Akram M., et al.
Published: (2015)
Analysis of wardriving activity and WiFi access points
by: Eldaw, Elbaraa, et al.
Published: (2013)
by: Eldaw, Elbaraa, et al.
Published: (2013)
A dynamic method for establishing efficient and scalable rekeying algorithm in mobile WiMAX
by: Mohd Ali, Borhanuddin, et al.
Published: (2012)
by: Mohd Ali, Borhanuddin, et al.
Published: (2012)
Mathematical evaluation of context transfer and multicast fast reroute in multicast enabled network mobility management
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2017)
The study of multicast listener discovery
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011)
Mobility management in multicast environment
by: Sanni, Mistura L., et al.
Published: (2011)
by: Sanni, Mistura L., et al.
Published: (2011)
Ibn al-Khatib and his theory of contagion
by: Senan, Shayma, et al.
Published: (2011)
by: Senan, Shayma, et al.
Published: (2011)
QOS multicast routing in MANETs
by: Qabajeh, Mohammad, et al.
Published: (2011)
by: Qabajeh, Mohammad, et al.
Published: (2011)
Similar Items
-
An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees
by: Zakaria, Omar, et al.
Published: (2014) -
Introduction to mobility multicast schemes
by: Hassan Abdalla Hashim, Aisha, et al.
Published: (2011) -
Multicast-unicast key management scheme in IPv6 networks
by: Mehdizadeh, Abbas, et al.
Published: (2014) -
Multicast Network Security using Quantum Key Distribution (QKD)
by: Ali, Sellami, et al.
Published: (2012) -
Performance aAnalysis of HRO-B+ scheme for the nested mobile networks using OPNet
by: Shayma, Senan, et al.
Published: (2017)