Survey on the Hierarchical Key Distribution Algorithms for Secure Multicast ing

  title={Survey on the Hierarchical Key Distribution Algorithms for Secure Multicast ing},
  author={Xu Yu},
Security is always a challenging task due to the dynamic nature of multicasting model as compraing to that of the unicasting network. In the passed two or three decades, cryptography has become the well-established means to solve the security problems in networking. However, there are still a lot of difficulties for directly deploying cryptography algorithms into multicasting environment as what has been done for unicasting environment. Among all of the issues, key distribution is regarded as… CONTINUE READING


Publications citing this paper.

Survey on Logical Key Hierarchy for secure group communication

2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT) • 2016
View 4 Excerpts
Highly Influenced


Publications referenced by this paper.
Showing 1-8 of 8 references

Kronos: A Scalable Group Re-Keying Approach for Secure Multicast

IEEE Symposium on Security and Privacy • 2000
View 12 Excerpts
Highly Influenced

Revocation and Tracing Schemes for Stateless Receivers

IACR Cryptology ePrint Archive • 2001
View 4 Excerpts
Highly Influenced

Secure group communications using key graphs

IEEE/ACM Trans. Netw. • 2000
View 4 Excerpts
Highly Influenced

A survey of multicast security issues and architectures

P. S. Krus
In 21st National Information Systems Security Conference, • 1998
View 2 Excerpts

Intra-domain group key management

T. Hardjono, B. Cain, I. Monga
protocol. Internet-Draft, • 1998
View 2 Excerpts

Similar Papers

Loading similar papers…