A key distribution and rekeying framework with totally ordered multicast protocols
暂无分享,去创建一个
[1] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[2] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[3] Jon Crowcroft,et al. Core Based Trees (CBT) An Architecture for Scalable Inter-Domain Multicast Routing , 1993, SIGCOMM 1993.
[4] Simon S. Lam,et al. SNP: An Interface for Secure Network Programming , 1994, USENIX Summer.
[5] Moti Yung,et al. The KryptoKnight family of light-weight protocols for authentication and key distribution , 1995, TNET.
[6] John R. Callahan,et al. Fault recovery in the reliable multicast protocol , 1995 .
[7] Jon Crowcroft,et al. Multicast-specific security threats and counter-measures , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[8] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.
[9] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[10] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[11] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[12] Douglas R. Stinson,et al. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption , 1997, Des. Codes Cryptogr..
[13] Danny Dolev,et al. An adaptive totally ordered multicast protocol that tolerates partitions , 1998, PODC '98.
[14] Tadanori Mizuno,et al. A Reliable Multicast Protocol with Total Ordering for Distributed Virtual Environment , 2000, ICDCS Workshop on Group Communications and Computations.
[15] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.