Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Weaknesses in the Hur-Shin-Yoon decentralized group key management

Full metadata record
DC Field Value Language
dc.contributor.authorHwang, Jung Yeon-
dc.contributor.authorChun, Ji Young-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-08T11:24:09Z-
dc.date.available2021-09-08T11:24:09Z-
dc.date.created2021-06-11-
dc.date.issued2009-12-
dc.identifier.issn1530-8669-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/118880-
dc.description.abstractRecently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography. We show that the GKM scheme Unfortunately does not provide data confidentiality. We also present a counter measure to fix the security breaches. Copyright (C) 2009 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.titleWeaknesses in the Hur-Shin-Yoon decentralized group key management-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1002/wcm.741-
dc.identifier.scopusid2-s2.0-72949087944-
dc.identifier.wosid000272913200002-
dc.identifier.bibliographicCitationWIRELESS COMMUNICATIONS & MOBILE COMPUTING, v.9, no.12, pp.1565 - 1571-
dc.relation.isPartOfWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.citation.titleWIRELESS COMMUNICATIONS & MOBILE COMPUTING-
dc.citation.volume9-
dc.citation.number12-
dc.citation.startPage1565-
dc.citation.endPage1571-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthordecentralized group key management-
dc.subject.keywordAuthorforward secrecy-
dc.subject.keywordAuthorbackward secrecy-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE