暂无分享,去创建一个
[1] Amr M. Youssef,et al. Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme , 2007, ACNS.
[2] Gwoboa Horng,et al. Cryptanalysis of a Key Management Scheme for Secure Multicast Communications , 2002 .
[3] Eric Harder,et al. Logical Key Hierarchy Protocol , 1999 .
[4] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[5] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[6] Ran Canetti,et al. A taxonomy of multicast security issues (temporary version) , 1998 .
[7] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[8] Upkar Varshney,et al. Multicast over wireless networks , 2002, CACM.
[9] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[10] Wei-Chi Ku,et al. An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.
[11] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[12] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .