Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,266 papers from all fields of science
Search
Sign In
Create Free Account
Secure multicast
IP Multicast is an internet communication method where a single data packet can be transmitted from a sender and replicated to a set of receivers…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
1 relation
IPsec
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
M2M Security: Challenges and Solutions
Amira Barki
,
A. Bouabdallah
,
S. Gharout
,
Jacques Traoré
IEEE Communications Surveys and Tutorials
2016
Corpus ID: 20714061
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and…
Expand
Highly Cited
2015
Highly Cited
2015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications
P. Porambage
,
An Braeken
,
C. Schmitt
,
A. Gurtov
,
M. Ylianttila
,
B. Stiller
IEEE Access
2015
Corpus ID: 9534007
Wireless sensor networks (WSNs) are a prominent fundamental technology of the Internet of Things (IoTs). Rather than device-to…
Expand
Highly Cited
2014
Highly Cited
2014
Chinese remainder theorem based centralised group key management for secure multicast communication
P. Vijayakumar
,
S. Bose
,
A. Kannan
IET Information Security
2014
Corpus ID: 5475000
Designing a centralised group key management with minimal computation complexity to support dynamic secure multicast…
Expand
Highly Cited
2007
Highly Cited
2007
Hierarchical group access control for secure multicast communications
Yan Sun
,
K.J.R. Liu
IEEE/ACM Transactions on Networking
2007
Corpus ID: 13437277
Many group communications require a security infrastructure that ensures multiple levels of access control for group members…
Expand
Highly Cited
2003
Highly Cited
2003
LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks
R. D. Pietro
,
L. Mancini
,
Yee Wei Law
,
S. Etalle
,
P. Havinga
International Conference on Parallel Processing…
2003
Corpus ID: 2929888
In this paper, we present a mechanism for securing group communications in Wireless Sensor Networks (WSN). First, we derive an…
Expand
Highly Cited
2003
Highly Cited
2003
Energy-aware secure multicast communication in ad-hoc networks using geographic location information
Loukas Lazos
,
R. Poovendran
IEEE International Conference on Acoustics…
2003
Corpus ID: 16773950
The problem of securing multicast communications in an energy-constrained ad-hoc network requires the efficient management of…
Expand
Highly Cited
2002
Highly Cited
2002
Gothic: a group access control architecture for secure multicast and anycast
Paul Judge
,
M. Ammar
Proceedings.Twenty-First Annual Joint Conference…
2002
Corpus ID: 15652716
Multicast and anycast have received considerable attention due to their ability to support networked services. There are distinct…
Expand
Highly Cited
2001
Highly Cited
2001
Scalable secure group communication over IP multicast
Suman Banerjee
,
Bobby Bhattacharjee
Proceedings Ninth International Conference on…
2001
Corpus ID: 14436412
We introduce and analyze a scalable re-keying scheme for implementing secure group communications over IP multicast. We show that…
Expand
Highly Cited
2001
Highly Cited
2001
The round complexity of verifiable secret sharing and secure multicast
R. Gennaro
,
Yuval Ishai
,
E. Kushilevitz
,
T. Rabin
Symposium on the Theory of Computing
2001
Corpus ID: 5130475
The <italic>round complexity</italic> of interactive protocols is one of their most important complexity measures. In this work…
Expand
Highly Cited
1999
Highly Cited
1999
A secure multicast protocol with copyright protection
Hao-Hua Chu
,
Lintian Qiao
,
K. Nahrstedt
,
Hua Wang
,
Ritesh Jain
CCRV
1999
Corpus ID: 14701684
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE