A survey of key management for secure group communication

S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …

Security and channel noise management in cognitive radio networks

A Haldorai, A Ramu - Computers & Electrical Engineering, 2020 - Elsevier
Abstract The Spectrum Channel Noise is a pseudorandom or random computational
process in a manner that allows the security competence of the available spectrum …

Secure attribute-based systems

M Pirretti, P Traynor, P McDaniel, B Waters - Proceedings of the 13th …, 2006 - dl.acm.org
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …

Distributed firewall system and method

TR Markham - US Patent 7,536,715, 2009 - Google Patents
A system and method for restricting packet transfer to a computer across a network, wherein
the computer includes a network interface device coupled to the network and wherein the …

Message processing methods and systems

T Dimitrakos, L Titkov, A Maierhofer - US Patent 8,856,862, 2014 - Google Patents
Methods and apparatus for controlling the operation of a distributed application using
message interception tech niques are disclosed. The message interception software is …

On the performance of group key agreement protocols

Y Amir, Y Kim, C Nita-Rotaru, G Tsudik - ACM Transactions on …, 2004 - dl.acm.org
Group key agreement is a fundamental building block for secure peer group communication
systems. Several group key management techniques were proposed in the last decade, all …

A survey of security issues in multicast communications

MJ Moyer, JR Rao, P Rohatgi - IEEE network, 1999 - ieeexplore.ieee.org
The emergence and popularity of group-oriented applications on the World Wide Web has
triggered a demand for scalable security solutions for group communication. One such …

Methods and limitations of security policy reconciliation

P McDaniel, A Prakash - ACM Transactions on Information and System …, 2006 - dl.acm.org
A security policy specifies session participant requirements. However, existing frameworks
provide limited facilities for the automated reconciliation of participant policies. This paper …

System and method for secure group communications

RO Hanzlik, GA Lowe, TR Markham… - US Patent …, 2009 - Google Patents
A system and method for secure group communications is described herein. In the following
detailed description of the embodiments, reference is made to the accompanying draw ings …

Secure group communication using robust contributory key agreement

Y Amir, Y Kim, C Nita-Rotaru, JL Schultz… - … on Parallel and …, 2004 - ieeexplore.ieee.org
Contributory group key agreement protocols generate group keys based on contributions of
all group members. Particularly appropriate for relatively small collaborative peer groups …