Chinese remainder theorem based centralised group key management for secure multicast communication
Designing a centralised group key management with minimal computation complexity to
support dynamic secure multicast communication is a challenging issue in secure …
support dynamic secure multicast communication is a challenging issue in secure …
[HTML][HTML] A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem
In the secure multicast communication, data is transmitted in such a manner that only
authorized group members are able to receive the data. The main challenging issue in …
authorized group members are able to receive the data. The main challenging issue in …
[HTML][HTML] Centralized key distribution protocol using the greatest common divisor method
Designing a key distribution protocol with minimal computation and storage complexity is a
challenging issue in secure multimedia multicast. In most of the multimedia multicast …
challenging issue in secure multimedia multicast. In most of the multimedia multicast …
Key tree and Chinese remainder theorem based group key distribution scheme
J Zhou, Y Ou - Algorithms and Architectures for Parallel Processing …, 2009 - Springer
A group key distribution scheme based on static key tree structure and the Chinese
Remainder Theorem (KTCRT-GKD) is proposed. It deal with the scenario of a pre-defined …
Remainder Theorem (KTCRT-GKD) is proposed. It deal with the scenario of a pre-defined …
SCGKM: a secure and cost-effective group key management scheme for multicast communication in large dynamic groups
The major challenge in multicast communications is to have a key management protocol
with minimal computational, communication, and storage complexities without breaching …
with minimal computational, communication, and storage complexities without breaching …
A provably secure group key agreement scheme with privacy preservation for online social networks using extended chaotic maps
With the rapid growth in the popularity of mobile devices and development of network
technologies, various online social networking applications have grown in popularity. While …
technologies, various online social networking applications have grown in popularity. While …
Secure multiple group ownership transfer protocol for mobile RFID
MH Yang - Electronic Commerce Research and Applications, 2012 - Elsevier
With the combination of mobile devices and readers in recent years, mobile Radio
Frequency Identification (RFID) systems have been widely deployed in mobile identification …
Frequency Identification (RFID) systems have been widely deployed in mobile identification …
A computation-efficient group key distribution protocol based on a new secret sharing scheme
R Jiao, H Ouyang, Y Lin, Y Luo, G Li, Z Jiang, Q Zheng - Information, 2019 - mdpi.com
With the development of 5G and the Internet of Things (IoT), mobile terminals are widely
used in various applications under multicast scenarios. However, due to the limited …
used in various applications under multicast scenarios. However, due to the limited …
Trusted Scalable SAT Solving with on-the-fly LRAT Checking
D Schreiber - 27th International Conference on Theory and …, 2024 - drops.dagstuhl.de
Recent advances have enabled powerful distributed SAT solvers to emit proofs of
unsatisfiability, which renders them as trustworthy as sequential solvers. However, this mode …
unsatisfiability, which renders them as trustworthy as sequential solvers. However, this mode …
A secure partial RFID ownership transfer protocol with multi-owners
JN Luo, MH Yang - Sensors, 2019 - mdpi.com
Mobile radio frequency identification (RFID) has been extensively applied in a wide range of
fields. In supply chain management, RFID is used to more efficiently manage the ownership …
fields. In supply chain management, RFID is used to more efficiently manage the ownership …