Back to Results
First PageMeta Content
Rekeying / Data management / Computing / Graph theory / B-tree / R-tree / Binary tree


1 Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups Patrick P. C. Lee, John C. S. Lui, and David K. Y. Yau
Add to Reading List

Document Date: 2005-06-19 23:01:08


Open Document

File Size: 269,98 KB

Share Result on Facebook

City

NTERVAL / Authenticated Tree / T REE / /

Company

D ISTRIBUTED R EKEYING A LGORITHMS We / Computer Sciences / /

/

Event

FDA Phase / Reorganization / /

Facility

SEcure Communication Library / Columbia University / The Chinese University of Hong Kong / Purdue University / /

IndustryTerm

adhoc networks / authentication protocol / symmetric encryption algorithm / agreement protocols / interval-based rekeying algorithms / dynamic peer groups / dynamic peer / high processing load / interval-based distributed rekeying algorithms / secure group-based applications / cyclic / security services / communication / authenticated group key agreement protocol / dynamic communication / authentication protocols / pre-processing / ad-hoc network / /

Organization

All / Purdue University / Columbia University / New York / Department of Computer Sciences / Department of Computer Science / Chinese University of Hong Kong / Hong Kong / T20 / /

Person

John C. S. Lui / Mi / Patrick P. C. Lee / P. Lee / /

/

Position

single group controller / group controller / /

Product

T10 / M-16 / M-9 / M5 / M1 / /

Technology

authentication protocol / symmetric encryption algorithm / three algorithms / interval-based algorithms / three interval-based rekeying algorithms / peer-to-peer / three interval-based algorithms / key agreement protocol / ordered message delivery A. Rebuild Algorithm / three proposed algorithms / two interval-based algorithms / Diffie-Hellman key exchange protocol / key distribution protocols / TGDH protocol / Batch algorithm / secret key / key agreement protocols / C. Queue-batch Algorithm B. Batch Algorithm The Batch algorithm / Batch algorithms / key management protocols / two algorithms / encryption / three interval-based distributed rekeying algorithms / public key / Queuebatch algorithm / authentication protocols / Queue-batch algorithm / simulation / interval-based rekeying algorithms / Rebuild algorithm / Diffie-Hellman protocol / /

SocialTag