A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication

D Huang - US Patent 10,425,411, 2019 - Google Patents
Abstract Systems and apparatuses for a secure mobile cloud framework (referred to as
MobiCloud) for mobile computing and communication are disclosed. Embodiments of …

Chinese remainder theorem based centralised group key management for secure multicast communication

P Vijayakumar, S Bose, A Kannan - IET information Security, 2014 - Wiley Online Library
Designing a centralised group key management with minimal computation complexity to
support dynamic secure multicast communication is a challenging issue in secure …

Blockchain-based secure key management for mobile edge computing

J Li, J Wu, L Chen, J Li, SK Lam - IEEE Transactions on Mobile …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC) is a promising edge technology to provide high bandwidth
and low latency shared services and resources to mobile users. However, the MEC …

A practical and flexible key management mechanism for trusted collaborative computing

X Zou, YS Dai, E Bertino - IEEE INFOCOM 2008-The 27th …, 2008 - ieeexplore.ieee.org
Trusted collaborative computing (TCC) is a new research and application paradigm. Two
important challenges in such a context are represented by secure information transmission …

Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges

B Daghighi, MLM Kiah, S Shamshirband… - Journal of Network and …, 2015 - Elsevier
Group communication has been increasingly used as an efficient communication
mechanism for facilitating emerging applications that require packet delivery from one or …

Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs

BJ Chang, SL Kuo - IEEE Transactions on Vehicular …, 2008 - ieeexplore.ieee.org
To increase efficiency in mobile ad hoc networks (MANETs), the multicast MANET is
proposed for a sender that sends packets to several receivers through a multicast session. In …

TROPHY: Trustworthy VANET routing with group authentication keys

P Cirne, A Zúquete, S Sargento - Ad Hoc Networks, 2018 - Elsevier
Abstract Vehicular Ad Hoc Networks (VANETs) are a specific case of ad hoc networks where
most of the nodes are vehicles. VANETs have emerged in the last few years and are likely to …

[HTML][HTML] Centralized key distribution protocol using the greatest common divisor method

P Vijayakumar, S Bose, A Kannan - Computers & Mathematics with …, 2013 - Elsevier
Designing a key distribution protocol with minimal computation and storage complexity is a
challenging issue in secure multimedia multicast. In most of the multimedia multicast …

An efficient group key agreement protocol for secure P2P communication

P Vijayakumar, R Naresh… - Security and …, 2016 - Wiley Online Library
The efficient design of a distributed group key management for a peer to peer (P2P) network
with minimal computation complexity in dynamic secure group communication is a …