Comparative Analysis of Distributed Group Key Establishment Protocols Based on Subgroup Approach
暂无分享,去创建一个
[1] Kevin C. Almeroth,et al. Collecting and modeling the join/leave behavior of multicast group members in the MBone , 1996, Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing.
[2] J.W. Atwood,et al. SIM-KM: scalable infrastructure for multicast key management , 2004, 29th Annual IEEE International Conference on Local Computer Networks.
[3] J. William Atwood,et al. Proxy encryptions for secure multicast key management , 2003, 28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings..
[4] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[5] Refik Molva,et al. Scalable multicast security in dynamic groups , 1999, CCS '99.
[6] Yang Richard Yang,et al. Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.
[7] J. J. Garcia-Luna-Aceves,et al. The ordered core based tree protocol , 1997, Proceedings of INFOCOM '97.
[8] J. J. Garcia-Luna-Aceves,et al. KHIP—a scalable protocol for secure multicast routing , 1999, SIGCOMM '99.
[9] Yacine Challal,et al. SAKM: a scalable and adaptive key management approach for multicast communications , 2004, CCRV.
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] Li Gong,et al. Trade-offs in routing private multicast traffic , 1995, Proceedings of GLOBECOM '95.
[12] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .