MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences
暂无分享,去创建一个
[1] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[2] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[3] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[4] Deborah Estrin,et al. Sharing the “cost” of multicast trees: an axiomatic analysis , 1995, SIGCOMM '95.
[5] Dilip D. Kandlur,et al. Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[6] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[7] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[8] Colin Perkins,et al. Watercasting: Distributed Watermarking of Multicast Media , 1999, Networked Group Communication.
[9] Peter Bagnall,et al. Taxonomy of Communication Requirements for Large-scale Multicast Applications , 1999, RFC.
[10] Ralf Steinmetz,et al. Evaluation of Different Video Encryption Methods for a Secure Multimedia Conferencing Gateway , 1997, COST 237 Workshop.
[11] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[12] Thierry Turletti,et al. A N aming Approach for ALF Design , 1998 .
[13] Mark Handley,et al. On Scalable Internet Multimedia Conferencing Systems , 1997 .
[14] Bob Briscoe,et al. Nark: receiver-based multicast non-repudiation and key management , 1999, EC '99.
[15] Charalampos Manifavas,et al. Chameleon - A New Kind of Stream Cipher , 1997, FSE.
[16] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.