Group Communication Using-A Dynamic Key Generation Protocol (original) (raw)

A Secure Key Agreement Protocol for Dynamic Group

Shin-Gak Kang, Muhammad Bilal

View PDFchevron_right

Group Rekeying Protocol for Secure communication

International Journal IJRITCC

View PDFchevron_right

Provably-Secure and communication-efficient scheme for dynamic group key exchange

Seungjoo Kim

2004

View PDFchevron_right

Efficient Authenticated Key Agreement Protocol for Dynamic Groups

Taewhan Yoo

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Scalable and fault-tolerant key agreement protocol for dynamic groups

Ahmed Abdel-Hafez

International Journal of Network Management, 2006

View PDFchevron_right

Secure Message Transmission Using Centralized Group Key Distribution Protocol

IJRASET Publication

International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022

View PDFchevron_right

A Flexible Communication of Group Key Agreement.

Ijesrt Journal

International Journal of Engineering Sciences & Research Technology, 2014

View PDFchevron_right

A SECURE KEY COMPUTATION PROTOCOL FOR SECURE GROUP COMMUNICATION WITH PASSWORD BASED AUTHENTICATION

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

View PDFchevron_right

Secure group communication protocol for distributed systems

Makoto Takizawa

View PDFchevron_right

SGKMP: A scalable group key management protocol

Naveed Islam

Sustainable Cities and Society, 2018

View PDFchevron_right

Comparison of group key establishment protocols

Serap Şahin

TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES, 2017

View PDFchevron_right

A New Efficient Authenticated ID-Based Group Key Agreement Protocol

mohammad sabzinejad Farash

2011

View PDFchevron_right

A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY

IRJET Journal

View PDFchevron_right

SECURE AND EFFICIENT DECENTRALIZED GROUP KEY ESTABLISHMENT PROTOCOL FOR ROBUST GROUP COMMUNICATION

RAKESH GANGWAR

2008

View PDFchevron_right

IRJET-A SURVEY ON GROUP KEY AGREEMENT FOR SECURELY SHARING A SECRET KEY

IRJET Journal

View PDFchevron_right

Hybrid Key Management for Group Communications

Ahmed Abdel-Hafez

The International Conference on Electrical Engineering, 2006

View PDFchevron_right

Tree and elliptic curve based efficient and secure group key agreement protocol

Arjun singh Rawat

Journal of Information Security and Applications, 2020

View PDFchevron_right

Cryptanalysis and Improvement of Group Key Transfer Protocol based on Secret Sharing

Journal of Computer Science IJCSIS

View PDFchevron_right

Distributed Group Key Management with Cluster based Communication for Dynamic Peer Groups

rajender dharavath

International Journal of Advanced Computer Science and Applications, 2011

View PDFchevron_right

Implementation of Distributed Key Generation Algorithms using Secure Sockets

Anthony T Chronopoulos

The 3rd IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA, pp. 393-398, 30 August 2004, 2004

View PDFchevron_right

An Efficient Group Key Transport Protocol

Manisha Joshi

2014

View PDFchevron_right

DM-GKM: A key management scheme for dynamic group based applications

Zahid Abbas

Computer Networks, 2020

View PDFchevron_right

Efficient Group Key Management Protocol with One-Way Key Derivation

Hung-chang Lee

IEEE Conference on Local Computer Networks, 2005

View PDFchevron_right

On the Security of Authenticated Group Key Agreement Protocols

Himani Bansal

Scalable Computing: Practice and Experience

View PDFchevron_right

A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group

Dr. Abhimanyu Kumar

Wireless Personal Communications, 2015

View PDFchevron_right

Implementing Secure Group Communications using Key Graphs

Aswani Kumar

Defence Science Journal, 2007

View PDFchevron_right

A Centralized Key Table based Communication Efficient Group Key Management Protocol

Rajan Bichkar

International Journal of Computer Network and Information Security, 2015

View PDFchevron_right