Have a personal or library account? Click to login
A Survey on Group Key Management Schemes Cover
By:
Open Access
|Oct 2015

Abstract

Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.

DOI: https://doi.org/10.1515/cait-2015-0038 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 3 - 25
Published on: Oct 5, 2015
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2015 R. Seetha, R. Saravanan, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.