Login / Signup

On rekey policies for secure group applications.

Qingyu ZhangKenneth L. Calvert
Published in: ICCCN (2003)
Keyphrases
  • optimal policy
  • security issues
  • database
  • security analysis
  • genetic algorithm
  • highly efficient
  • group members
  • authentication protocol