Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication |
Vijayakumar, P.
(Department of Computer Science and Engineering, University College of Engineering Tindivanam)
Bose, S. (Department of Computer Science and Engineering, Anna University Chennai) Kannan, A. (Department of Information Science and Technology, Anna University Chennai) Jegatha Deborah, L. (Department of Computer Science and Engineering, University College of Engineering Tindivanam) |
1 | Wade Trappe, Jie Song, Radha Poovendran, Ray Liu K J, "Key management and distribution for secure multimedia multicast," IEEE Transactions on Multimedia,Vol.5,No.4, pp. 544-557, 2003. DOI ScienceOn |
2 | Xianjin Fang, Longshu Li, "On karatsuba multiplication algorithm," in Proc. of 7th Int. Data, Privacy, and E-Commerce Symp., Washington, DC, USA, pp. 274-276, 2007. |
3 | Tom St Denis, "Bignum math implementing cryptographic multiple precision arithmetic," SYNGRESS Publishing, 2003. |
4 | Meftah,S., Razali,R., Samsudin,A., Budiator,R., "Enhancing public-key cryptosystem using parallel karatsuba algorithm with socket programming," in Proc. of 9th Asia-Pacific Conference on Coomunication, Penang, Malaysia, September 21-24, pp. 706-710, 2003. |
5 | Jebelean,T., "Using the parallel karatsuba algorithm for long integer multiplication and division," in Proc. of European Conference on Parallel Processing, in Lecture Notes in Computer Science, pp. 1169-1172, 1997. |
6 | Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "An effective key distribution protocol for secure multicast communication," in Proc. of IEEE International Conference on Advanced Computing, Chennai, December 14-16, pp. 102-107, 2010. |
7 | Sandeep S. Kulkarni, Bezawada Bruhadeshwar, "Key-update distribution in secure group communication," Elsevier, Computer Communications,Vol. 33,No.6, pp.689-705, 2010. DOI ScienceOn |
8 | Bezawada Bruhadeshwar, Kishore Kothapalli, "A family of collusion resistant symmetric key protocols for authentication," ICDCN, pp. 387-392, 2008. |
9 | Bezawada Bruhadeshwar, Kishore Kothapalli, Maddi Sree Deepya, "Reducing the cost of session key establishment," ARES, pp. 369-373, 2009. |
10 | Bezawada Bruhadeshwar, Kishore Kothapalli, Poornima,M., Divya,M., "Routing protocol security using symmetric key based techniques," ARES, pp. 193-200, 2009. |
11 | MacWilliams,F.J., and Sloane,N.J.A., "The theory of error correcting codes," North-Holland Math. Library,1977. |
12 | Adrian Perrig, Dawn Song, Tygar,J.D., "ELK: a new protocol for efficient large-group key distribution," in Proc. of IEEE Symposium on Security and Privacy Symposium, pp. 247-262, 2001. |
13 | Harney,H., Harder,E., "Logical key hierarchy protocol," Internat Draft, IETF, Expired in August 1999. |
14 | Xixiang Lv and Hui Li, "Group Key Agreement From Signcryption," KSII transactions on internet and information systems, Vol. 6, No. 12, pp. 3338-3351, Dec 2012. |
15 | Guiyi Wei, Xianbo Yang and Jun Shao, "Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol," KSII transactions on internet and information systems, Vol. 6, No.12, pp.3352-3365, Dec 2012. |
16 | Vijayakumar,P., Bose,S., Kannan,A., and Siva Subramanian,S., "A secure key distribution protocol for multicast communication," Balasubramaniam P. (eds.) Gandhigram-India, CCIS.,Vol.140, Springer, Heidelberg, 2011, pp. 249-257. |
17 | Vijayakumar,P., Bose,S., Kannan,A., "Centralized Key Distribution Protocol using the Greatest Common Divisor Method," Computers & Mathematics with Applications, Elsevier, Article Online. |
18 | Mingyan Li, Poovendran,R., David McGrew,A., "Minimizing center key storage in hybrid one-way function based group key management with communication constraints," Elsevier, Information Processing Letters, Vol.93, No.4, pp. 191-198, 2004. |
19 | Patrick P.C Lee, John C. S Lui, David K.Y Yau, "Distributed collaborative key agreement protocols for dynamic peer groups," in Proc. of the IEEE International Conference on Network Protocols, pp. 322, 2002. |
20 | Lihao Xu, Cheng Huang, "Computation-efficient multicast key distribution," IEEE Transactions on Parallel and Distributed Systems, Vol.19,No.5, pp. 1-10,2008. DOI ScienceOn |
21 | Wade Trappe, Jie Song, Radha Poovendran, K. J Ray Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 3, pp. 1449-1452, 2001. |
22 | Lee,J.S., Son,J.H., Park, Y.H.,Seo,S.W., "Optimal level-homogeneous tree structure for logical key hierarchy," in Proc. of IEEE Conference on Communication System Software and Middleware Workshop (COMSWARE), 2008. |
23 | Poovendran,R., Baras,J.S., "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Transactions on Information Theory, Vol. 47, No.7, pp. 2824-2834, 2001. DOI ScienceOn |
24 | Dong-Hyun Je, Jun-Sik Lee, Yongsuk Park, Seung-Woo Seo, "Computation-and-storage-efficient key tree management protocol for secure multicast communications," Elsevier, Computer Communications, Vol.33, No.6, pp. 136-148, 2010. DOI ScienceOn |
25 | Wong, C., Gouda,M., and Lam,S., "Secure group communications using key graphs, IEEE/ACM Transactions on Networking," Vol. 8, No.1, pp.16-30, 2000. DOI ScienceOn |
26 | David,A., McGrew and Alan T. Sherman, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on software engineering, Vol.29,No.5, pp. 444-458, 2003. DOI ScienceOn |