Search
Now showing items 1-2 of 2
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
(1999)
Several variations of rooted tree based solutions have been recently proposed for member revocation in multicast communications. <p>In this paper, we show that by assigning probabilities for member revocations, the optimality, ...
Analysis and Design of Robust Key Schemes for Multicast Communications
(1999)
Recent literature presents several rooted tree based member deletion/revocation schemes trying to simultaneously minimize the key storage whileproviding efficient member deletion/revocation. Many of these approaches have ...