Establishment of conference keys in heterogeneous networks

  title={Establishment of conference keys in heterogeneous networks},
  author={Wade Trappe and Yuke Wang and K. J. Ray Liu},
In order to secure communication amongst members of a conference, a secret shared by all group members must be established. The Diffie-Hellman problem is often the basis for generating keys in two-party communication, and can also be used to establish conference keys. In heterogeneous networks, many conferences have participants of varying computational power and resources. Most conference keying schemes do not address this concern and place the same burden upon less-powerful clients as more… CONTINUE READING
Highly Cited
This paper has 17 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 11 extracted citations

Key management scheme for multi-layer secure group communication

2009 First International Communication Systems and Networks and Workshops • 2009

Analysis and Protection of Dynamic Membership Information for Group Key Distribution Schemes

IEEE Transactions on Information Forensics and Security • 2007
View 3 Excerpts

Hierarchical group access control for secure multicast communications

IEEE/ACM Transactions on Networking • 2007
View 4 Excerpts


Publications referenced by this paper.
Showing 1-10 of 11 references

Group key agreement using divideand-conquer strategies

W. Trappe, Y. Wang, K.J.R. Liu
Conference on Information Sciences and Systems, The John’s Hopkins University , March 2001. • 2001
View 3 Excerpts
Highly Influenced

A dynamic key distribution scheme using data embedding for secure multimedia multicast

W. Trappe, J. Song, R. Poovendran, K.J.R. Liu
Submitted to IEEE Trans. on Multimedia , 2000. • 2000

Communication Complexity of Group Key Distribution

ACM Conference on Computer and Communications Security • 1998
View 2 Excerpts

A secure and efficient conference key distribution scheme,”Advances in Cryptology- Eurocrypt

M. Burmester, Y. Desmedt

A conference key distribution system

IEEE Trans. Information Theory • 1982
View 2 Excerpts

New directions in cryptography

IEEE Trans. Information Theory • 1976
View 2 Excerpts

Similar Papers

Loading similar papers…