A survey on group key management schemes

16Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.

Abstract

Cryptographic key management needs utmost security in generating, exchanging, using, rekeying, storing of keys, being used for communication purposes. Successful key management is critical to the security of a cryptosystem. This paper presents a detailed survey on group key management and its challenges in network independent and network dependent approaches. The paper also focuses on the advantages, disadvantages and security vulnerabilities of these protocols.

Cite

CITATION STYLE

APA

Seetha, R., & Saravanan, R. (2015). A survey on group key management schemes. Cybernetics and Information Technologies, 15(3), 3–25. https://doi.org/10.1515/cait-2015-0038

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free