The group security association for secure multicasting.
Wonjoo ParkJaehoon NahSungwon SohnDaeyoung KimPublished in: ICON (2001)
Keyphrases
- key distribution
- security requirements
- security issues
- key management
- security measures
- security level
- security mechanisms
- security management
- security services
- data security
- cryptographic protocols
- security architecture
- security properties
- sensitive data
- private key
- security analysis
- data encryption
- information security
- access control
- key agreement protocol
- authentication protocol
- security protocols
- diffie hellman
- secret key
- key exchange protocol
- stream cipher
- encryption scheme
- security policies
- digital signature scheme
- security patterns
- authentication mechanism
- mobile agent system
- user authentication
- integrity verification
- public key encryption
- key agreement
- digital rights management
- network security
- public key
- security model
- identity management
- authentication scheme
- key exchange
- public key cryptosystem
- key management scheme
- rfid systems
- unauthorized access
- secure communication
- provably secure
- public key infrastructure
- electronic voting
- trusted computing
- secure routing
- previously mentioned
- fault tolerant
- intrusion detection