ELK Key Distribution

  • Adrian Perrig
  • J. D. Tygar


Broadcast streams require authentication and confidentiality. Previous chapters present protocols for efficient authentication and signature protocols for broadcast streams. This chapter discusses confidentiality and access control.


Leaf Node Broadcast Message Forward Secrecy Unicast Message Leave Event 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2003

Authors and Affiliations

  • Adrian Perrig
    • 1
  • J. D. Tygar
    • 2
  1. 1.Carnegie Mellon UniversityUSA
  2. 2.UC BerkeleyUSA

Personalised recommendations