Author:
Koti Nishat,Keni Esha,Kritika ,Purushothama B. R.
Reference27 articles.
1. R. Aparna and B. B. Amberker. A key management scheme for secure group communication using binomial key trees. Int. Journal of Network Management, 20(6):383--418, 2010.
2. K. Becker and U. Wille. Communication complexity of group key distribution. In L. Gong and M. K. Reiter, editors, ACM Conference on Computer and Communications Security, pages 1--6. ACM, 1998.
3. C. Boyd. On key agreement and conference key agreement. In V. Varadharajan, J. Pieprzyk, and Y. Mu, editors, ACISP, volume 1270 of Lecture Notes in Computer Science, pages 294--302. Springer, 1997.
4. C.-C. Chang, L. Harn, and T.-F. Cheng. Notes on "polynomial-based key management for secure intra-group and inter-group communication". International Journal of Network Security, 16(2):143--148, 2014.
5. H.-H. Chu, L. Qiao, K. Nahrstedt, H. Wang, and R. Jain. A secure multicast protocol with copyright protection. Computer Communication Review, 32(2):42--60, 2002.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献