Mukherjee et al., 2007 - Google Patents
Scalable solutions for secure group communicationsMukherjee et al., 2007
- Document ID
- 8047809822153635395
- Author
- Mukherjee R
- Atwood J
- Publication year
- Publication venue
- Computer Networks
External Links
Snippet
With the advent of digital technologies and widening Internet bandwidth in recent years there has been a marked rise in new multimedia services, including teleconferencing, pay- per-view TV, interactive simulations, software updates and real-time delivery of stock market …
- 230000002452 interceptive 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television, VOD [Video On Demand]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of content streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hur et al. | Secure data retrieval for decentralized disruption-tolerant military networks | |
Baugher et al. | Multicast security (MSEC) group key management architecture | |
Caronni et al. | Efficient security for large and dynamic multicast groups | |
Hardjono et al. | Multicast and group security | |
US7957320B2 (en) | Method for changing a group key in a group of network elements in a network system | |
Chan et al. | Key management approaches to offer data confidentiality for secure multicast | |
Bilal et al. | A secure key agreement protocol for dynamic group | |
Lin et al. | Secure and efficient group key management with shared key derivation | |
Mehdizadeh et al. | Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks | |
Mukherjee et al. | Scalable solutions for secure group communications | |
Iqbal et al. | DM-GKM: A key management scheme for dynamic group based applications | |
Cao et al. | Scalable key management for secure multicast communication in the mobile environment | |
CN113973007A (en) | Time-controlled encrypted anonymous query method and system based on broadcast encryption and onion routing | |
Li et al. | Distributed key management scheme for peer‐to‐peer live streaming services | |
Han et al. | Proxy encryption based secure multicast in wireless mesh networks | |
Mukherjee et al. | SIM-KM: scalable infrastructure for multicast key management | |
Challal et al. | RLH: receiver driven layered hash-chaining for multicast data origin authentication | |
Tomar et al. | Secure Group Key Agreement with Node Authentication | |
Pinto et al. | On performance of group key distribution techniques when applied to IPTV services | |
Mukherjee | Secure group communication | |
Thomas et al. | A novel decentralized group key management using attribute based encryption | |
Mukherjee et al. | Multicast group authentication | |
Li | Secure multicast communications. | |
Baugher et al. | RFC 4046: Multicast security (MSEC) group key management architecture | |
Jain et al. | Group Key Management Protocols for Non-Network: A Survey. |