[go: up one dir, main page]

Mukherjee et al., 2007 - Google Patents

Scalable solutions for secure group communications

Mukherjee et al., 2007

Document ID
8047809822153635395
Author
Mukherjee R
Atwood J
Publication year
Publication venue
Computer Networks

External Links

Snippet

With the advent of digital technologies and widening Internet bandwidth in recent years there has been a marked rise in new multimedia services, including teleconferencing, pay- per-view TV, interactive simulations, software updates and real-time delivery of stock market …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0464Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television, VOD [Video On Demand]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Hur et al. Secure data retrieval for decentralized disruption-tolerant military networks
Baugher et al. Multicast security (MSEC) group key management architecture
Caronni et al. Efficient security for large and dynamic multicast groups
Hardjono et al. Multicast and group security
US7957320B2 (en) Method for changing a group key in a group of network elements in a network system
Chan et al. Key management approaches to offer data confidentiality for secure multicast
Bilal et al. A secure key agreement protocol for dynamic group
Lin et al. Secure and efficient group key management with shared key derivation
Mehdizadeh et al. Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks
Mukherjee et al. Scalable solutions for secure group communications
Iqbal et al. DM-GKM: A key management scheme for dynamic group based applications
Cao et al. Scalable key management for secure multicast communication in the mobile environment
CN113973007A (en) Time-controlled encrypted anonymous query method and system based on broadcast encryption and onion routing
Li et al. Distributed key management scheme for peer‐to‐peer live streaming services
Han et al. Proxy encryption based secure multicast in wireless mesh networks
Mukherjee et al. SIM-KM: scalable infrastructure for multicast key management
Challal et al. RLH: receiver driven layered hash-chaining for multicast data origin authentication
Tomar et al. Secure Group Key Agreement with Node Authentication
Pinto et al. On performance of group key distribution techniques when applied to IPTV services
Mukherjee Secure group communication
Thomas et al. A novel decentralized group key management using attribute based encryption
Mukherjee et al. Multicast group authentication
Li Secure multicast communications.
Baugher et al. RFC 4046: Multicast security (MSEC) group key management architecture
Jain et al. Group Key Management Protocols for Non-Network: A Survey.