Chinese remainder theorem based centralised group key management for secure multicast communication

P Vijayakumar, S Bose, A Kannan - IET information Security, 2014 - Wiley Online Library
Designing a centralised group key management with minimal computation complexity to
support dynamic secure multicast communication is a challenging issue in secure …

[HTML][HTML] A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem

V Kumar, R Kumar, SK Pandey - Journal of King Saud University-Computer …, 2020 - Elsevier
In the secure multicast communication, data is transmitted in such a manner that only
authorized group members are able to receive the data. The main challenging issue in …

[HTML][HTML] Centralized key distribution protocol using the greatest common divisor method

P Vijayakumar, S Bose, A Kannan - Computers & Mathematics with …, 2013 - Elsevier
Designing a key distribution protocol with minimal computation and storage complexity is a
challenging issue in secure multimedia multicast. In most of the multimedia multicast …

Key tree and Chinese remainder theorem based group key distribution scheme

J Zhou, Y Ou - Algorithms and Architectures for Parallel Processing …, 2009 - Springer
A group key distribution scheme based on static key tree structure and the Chinese
Remainder Theorem (KTCRT-GKD) is proposed. It deal with the scenario of a pre-defined …

SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups

V Kumar, O Pal, V Thakur, K Kumar - International Journal of Information …, 2022 - Springer
The major challenge in multicast communications is to have a key management protocol
with minimal computational, communication, and storage complexities without breaching …

A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps

CT Li, TY Wu, CM Chen - IEEE Access, 2018 - ieeexplore.ieee.org
With the rapid growth in the popularity of mobile devices and development of network
technologies, various online social networking applications have grown in popularity. While …

Secure multiple group ownership transfer protocol for mobile RFID

MH Yang - Electronic Commerce Research and Applications, 2012 - Elsevier
With the combination of mobile devices and readers in recent years, mobile Radio
Frequency Identification (RFID) systems have been widely deployed in mobile identification …

A computation-efficient group key distribution protocol based on a new secret sharing scheme

R Jiao, H Ouyang, Y Lin, Y Luo, G Li, Z Jiang, Q Zheng - Information, 2019 - mdpi.com
With the development of 5G and the Internet of Things (IoT), mobile terminals are widely
used in various applications under multicast scenarios. However, due to the limited …

Trusted Scalable SAT Solving with on-the-fly LRAT Checking

D Schreiber - 27th International Conference on Theory and …, 2024 - drops.dagstuhl.de
Recent advances have enabled powerful distributed SAT solvers to emit proofs of
unsatisfiability, which renders them as trustworthy as sequential solvers. However, this mode …

A secure partial RFID ownership transfer protocol with multi-owners

JN Luo, MH Yang - Sensors, 2019 - mdpi.com
Mobile radio frequency identification (RFID) has been extensively applied in a wide range of
fields. In supply chain management, RFID is used to more efficiently manage the ownership …