Back to Search
Start Over
A Survey on Group Key Management Schemes
- Source :
- Cybernetics and Information Technologies, Vol 15, Iss 3, Pp 3-25 (2015)
- Publication Year :
- 2015
- Publisher :
- Sciendo, 2015.
-
Abstract
- Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.
- Subjects :
- group key
security
rekeying
multicast
key management
Cybernetics
Q300-390
Subjects
Details
- Language :
- English
- ISSN :
- 13144081
- Volume :
- 15
- Issue :
- 3
- Database :
- Directory of Open Access Journals
- Journal :
- Cybernetics and Information Technologies
- Publication Type :
- Academic Journal
- Accession number :
- edsdoj.32dd891b2b5845ab80ac1ef267ca9884
- Document Type :
- article
- Full Text :
- https://doi.org/10.1515/cait-2015-0038