International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 6, June 2014

Multicasting with Key Management

Chaithra K, Asha N

The Multicasting with Key Management allows each member to maintain a single public/secret key pair. Upon seeing the public keys of the members; a remote sender can securely broadcast to any intended subgroup chosen in an ad hoc way without depending on fully trusted authority. Even if all the non-intended members collude; they cannot extract any useful information from the transmitted messages. This system will provide an efficient member deletion/addition.

Keywords: Cryptography, Key Management, Group Key Agreement, Broadcast Encryption, Ad-Hoc Networks

Edition: Volume 3 Issue 6, June 2014

Pages: 1584 - 1587


How to Cite this Article?

Chaithra K, Asha N, "Multicasting with Key Management", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=2014575, Volume 3 Issue 6, June 2014, 1584 - 1587

24 PDF Views | 31 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2927 - 2930

Incorporating Google Cloud Based Pub/Sub in Implementation of Identity Concentrated Encryption

Shilpashree K S, Harshavardhan L

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article



Similar Articles with Keyword 'Key Management'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1191 - 1196

Lightweight Key Distribution for Secure Routing and Secure Information Propagation

Anubha Goyal, Geetanjali Babbar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2885 - 2889

An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud

Kirti Panmand, Sandeep Kadam

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2579 - 2581

Decentralized Access Control of Data Stored In Cloud Using Attribute Based Encryption and Hidden Attributes

Sumedha Tathavadekar, Vikas Maral

Share this article



Similar Articles with Keyword 'Broadcast Encryption'

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1788 - 1790

Attribute Base Keyword Search Is Confirmable Over the Outsource Encrypted Data

Amruta N. Deshmukh, Komal B. Bijwe

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1880 - 1884

A Dynamic Secure Group Sharing in Cloud Computing

Shobha D. Patil, Dr. Sulochana B. Sonkamble

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1930 - 1937

A Cloud Approach for Secure Multi Data sharing between the Users

Deeti Naga Vijay, A. Jyothi

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1358 - 1361

A Survey on Privacy Preservation and sharing Data Securely in Cloud Storage

Manoj. S. Tore, S. K. Sonkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1584 - 1587

Multicasting with Key Management

Chaithra K, Asha N

Share this article



Similar Articles with Keyword 'Ad-Hoc Networks'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1987 - 1989

Secured Routing Using ALERT in MANETs

Aniket K. Khasnikar, Smita Kapse

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2234 - 2241

Distributed Direct Neighbour Comparison Based Approach

Pankaj Singh Chouhan, Brajesh Kumar Shrivash, Nidhi Bajpai

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2571 - 2577

Large-Scale Cost-Effective Secured Content Distribution in the Cities Using Vehicular Networks

Vinay M Naganur, Anand R

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2103 - 2108

Secure Broadcasting Probability to Enhance Mobile Ad-hoc Network Using NCPR

Kajal Kunte, Navnath Kale

Share this article
Top