A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
D Huang - US Patent 10,425,411, 2019 - Google Patents
Abstract Systems and apparatuses for a secure mobile cloud framework (referred to as
MobiCloud) for mobile computing and communication are disclosed. Embodiments of …
MobiCloud) for mobile computing and communication are disclosed. Embodiments of …
Chinese remainder theorem based centralised group key management for secure multicast communication
Designing a centralised group key management with minimal computation complexity to
support dynamic secure multicast communication is a challenging issue in secure …
support dynamic secure multicast communication is a challenging issue in secure …
Blockchain-based secure key management for mobile edge computing
Mobile edge computing (MEC) is a promising edge technology to provide high bandwidth
and low latency shared services and resources to mobile users. However, the MEC …
and low latency shared services and resources to mobile users. However, the MEC …
A practical and flexible key management mechanism for trusted collaborative computing
Trusted collaborative computing (TCC) is a new research and application paradigm. Two
important challenges in such a context are represented by secure information transmission …
important challenges in such a context are represented by secure information transmission …
Toward secure group communication in wireless mobile environments: Issues, solutions, and challenges
Group communication has been increasingly used as an efficient communication
mechanism for facilitating emerging applications that require packet delivery from one or …
mechanism for facilitating emerging applications that require packet delivery from one or …
Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs
BJ Chang, SL Kuo - IEEE Transactions on Vehicular …, 2008 - ieeexplore.ieee.org
To increase efficiency in mobile ad hoc networks (MANETs), the multicast MANET is
proposed for a sender that sends packets to several receivers through a multicast session. In …
proposed for a sender that sends packets to several receivers through a multicast session. In …
TROPHY: Trustworthy VANET routing with group authentication keys
Abstract Vehicular Ad Hoc Networks (VANETs) are a specific case of ad hoc networks where
most of the nodes are vehicles. VANETs have emerged in the last few years and are likely to …
most of the nodes are vehicles. VANETs have emerged in the last few years and are likely to …
[HTML][HTML] Centralized key distribution protocol using the greatest common divisor method
Designing a key distribution protocol with minimal computation and storage complexity is a
challenging issue in secure multimedia multicast. In most of the multimedia multicast …
challenging issue in secure multimedia multicast. In most of the multimedia multicast …
An efficient group key agreement protocol for secure P2P communication
P Vijayakumar, R Naresh… - Security and …, 2016 - Wiley Online Library
The efficient design of a distributed group key management for a peer to peer (P2P) network
with minimal computation complexity in dynamic secure group communication is a …
with minimal computation complexity in dynamic secure group communication is a …