A survey of key management for secure group communication
S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …
messages. However, there is a challenge of effectively controlling access to the transmitted …
Security and channel noise management in cognitive radio networks
A Haldorai, A Ramu - Computers & Electrical Engineering, 2020 - Elsevier
Abstract The Spectrum Channel Noise is a pseudorandom or random computational
process in a manner that allows the security competence of the available spectrum …
process in a manner that allows the security competence of the available spectrum …
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …
Distributed firewall system and method
TR Markham - US Patent 7,536,715, 2009 - Google Patents
A system and method for restricting packet transfer to a computer across a network, wherein
the computer includes a network interface device coupled to the network and wherein the …
the computer includes a network interface device coupled to the network and wherein the …
Message processing methods and systems
T Dimitrakos, L Titkov, A Maierhofer - US Patent 8,856,862, 2014 - Google Patents
Methods and apparatus for controlling the operation of a distributed application using
message interception tech niques are disclosed. The message interception software is …
message interception tech niques are disclosed. The message interception software is …
On the performance of group key agreement protocols
Group key agreement is a fundamental building block for secure peer group communication
systems. Several group key management techniques were proposed in the last decade, all …
systems. Several group key management techniques were proposed in the last decade, all …
A survey of security issues in multicast communications
The emergence and popularity of group-oriented applications on the World Wide Web has
triggered a demand for scalable security solutions for group communication. One such …
triggered a demand for scalable security solutions for group communication. One such …
Methods and limitations of security policy reconciliation
P McDaniel, A Prakash - ACM Transactions on Information and System …, 2006 - dl.acm.org
A security policy specifies session participant requirements. However, existing frameworks
provide limited facilities for the automated reconciliation of participant policies. This paper …
provide limited facilities for the automated reconciliation of participant policies. This paper …
System and method for secure group communications
RO Hanzlik, GA Lowe, TR Markham… - US Patent …, 2009 - Google Patents
A system and method for secure group communications is described herein. In the following
detailed description of the embodiments, reference is made to the accompanying draw ings …
detailed description of the embodiments, reference is made to the accompanying draw ings …
Secure group communication using robust contributory key agreement
Contributory group key agreement protocols generate group keys based on contributions of
all group members. Particularly appropriate for relatively small collaborative peer groups …
all group members. Particularly appropriate for relatively small collaborative peer groups …