Key distribution scheme based on genetic algorithm in secure multicast

被引:0
|
作者
Xu, Q.
Zhao, H.
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A novel key management and distribution solution for secure video multicast
    Yin, H
    Chu, XW
    Lin, C
    Qiu, F
    Min, GY
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2, 2005, 3768 : 246 - 257
  • [42] Reliable Key Distribution for Secure Multicast by SRDP-Sign
    Tommasi, Franco
    Molendini, Simone
    Scialpi, Elena
    2009 FIRST INTERNATIONAL CONFERENCE ON ADVANCES IN FUTURE INTERNET, 2009, : 12 - 17
  • [43] RE-KEYING SCHEME FOR SECURE MULTICAST BASED ON MULTI-GROUP KEY TREE
    Li, Yang
    Xu, Guoai
    Niu, Xinxin
    Yang, Yixian
    PROCEEDINGS OF THE 2010 INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENCE AND AWARENESS INTERNET, AIAI2010, 2010, : 68 - 71
  • [44] Efficient ecc-based key management scheme for secure multicast in heterogeneous sensor networks
    Lee, Chin-I.
    Wu, Tzong-Chen
    Chien, Hung-Yu
    Tsai, Kuo-Yu
    ICIC Express Letters, Part B: Applications, 2012, 6 (08): : 2045 - 2050
  • [45] Error Detection and Correction for Secure Multicast Key Distribution Protocol
    Vijayakumar, P.
    Bose, S.
    Kannan, A.
    Thangam, V.
    Manoji, M.
    Vinayagam, M. S.
    ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, 2011, 198 : 308 - +
  • [46] Key management for secure multicast communication using secret sharing-based revocation scheme
    Liu, XX
    Yang, M
    Wang, XK
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1262 - 1266
  • [47] Analysis of a key distribution scheme in secure multicasting
    Maze, Gerard
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2012, 6 (01) : 69 - 80
  • [48] Secure and efficient conference key distribution scheme
    Yuan, Ding
    Fan, Ping-Zhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2002, 37 (04):
  • [49] A distributed and computationally secure key distribution scheme
    Daza, V
    Herranz, J
    Padró, C
    Sáez, G
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 342 - 356
  • [50] An optimized DNA based encryption scheme with enforced secure key distribution
    Zhang, Yunpeng
    Liu, Xin
    Ma, Yongqiang
    Cheng, Liang-Chieh
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (04): : 3119 - 3130