Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks
![]() |
Chang Woo-Suk
(School of Information and Communication Engineering, Sungkyunkwan University)
Kim Hyun-Jue (School of Information and Communication Engineering, Sungkyunkwan University) Nam Jung-Hyun (School of Information and Communication Engineering, Sungkyunkwan University) Cho Seok-Hyang (School of Information and Communication Engineering, Sungkyunkwan University) Won Dong-Ho (School of Information and Communication Engineering, Sungkyunkwan University) Kim Seung-Joo (School of Information and Communication Engineering, Sungkyunkwan University) |
1 | J. Nam, S. Kim, and D. Won, 'A Weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices', IEEE Communications Letters, Vol. 9, no. 5, pp. 429-431, May, 2005 DOI ScienceOn |
2 | J. Nam, J. Lee, S. Kim, and D. Won, 'DDH-based Group Key Agreement in a Mobile Environment', Journal of Systems and Software, Vol. 78, no. 1, pp. 73-83, October, 2005 DOI ScienceOn |
3 | S. Cho, J. Nam, S. Kim, and D. Won, 'An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices', Proceedings of ICCSA 2005, International Conference on Computational Science and Applications, Springer-Verlag, LNCS 3480, pp. 498-507, May, 2005 |
4 | T. Phan, L. Huang, and C. Dulan, 'Challenge: Integrating Mobile Wireless Devices into the Computational Grid', Proceedings of the 8th ACM Conference on Mobile Computing and Networking (MOBICOM'02), pp.271-278, September, 2002 DOI |
5 | Y. Kim, A. Perrig and G. Tsudik, 'Communication -efficient Group Key Agreement', Proceedings of International Federation for Information Processing (IFIP SEC'01), Springer- Verlag, LNCS 1163, pp. 229-244, June, 2001 |
6 | E. Bresson, O. Chevassut, A. Essiari, and D. Pointcheval, 'Mutual authentication and group key agreement for low-power mobile devices', Proceedings of the 5th IFIP-TC6/IEEE International Conference on Mobile and Wireless Communications Networks (MWCN'03), pp. 59-62, October, 2003 |
7 | M. Steiner, G. Tsudik and M. Waidner, 'Diffie-Hellman Key Distribution Extended to Group Communication', Proceedings of the 3rd ACM Conference on Computer and Communications Security (CSS'96), pp.31-37, May, 1996 DOI |
8 | K. Becker and U. Wille, 'Communication Complexity of Group key Distribution', Proceedings of the 5th ACM Conference on Computer and Communications Security (CCS'98), pp. 1-6, November, 1998 DOI |
9 | J. Katze and M. Yung, 'Scalable Protocols for Authenticated Group Key Exchange', Advances in Cryptology-Crypto'03, Springer-Verlag, LNCS 2729, pp. 110-125, August, 2003 |
10 | M. Burmester and Y. Desmedt, 'A secure and Efficient Conference Key Distribution System', Advances in Cryptology-Eurocrypt'94, Springer-Verlag, LNCS 950, pp.275-286, 1995 |
11 | J. Nam, S. Kim, and D. Won, 'Secure Group Communications over Combined Wired and Wireless Networks', Proceedings of TrustBus 2005, International Conference on Trust, Privacy, and Security in Digital Business (in conjunction with DEXA 2005), Springer-Verlag, LNCS 3592, pp. 90-99, August, 2005 |
12 | W. Diffie and M. Hellman, 'New Directions in Cryptography', IEEE Transactions on Information Theory, Vol. 22, no. 6, pp. 644-654, November, 1976 DOI |
13 | I. Ingemarsson, D. Tang, and C. Wong, 'A Conference Key Distribution System', IEEE Transactions on Information Theory, Vol. 28, no. 5, pp. 714-720, September, 1982 DOI |
![]() |