User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
暂无分享,去创建一个
Stefano Salsano | Giuseppe Bianchi | Alf Zugenmaier | Simone Teofili | Michele Di Mascolo | Cristina Basile | A. Zugenmaier | G. Bianchi | S. Salsano | S. Teofili | M. Mascolo | C. Basile
[1] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[2] Brian Weis,et al. Multicast Extensions to the Security Architecture for the Internet Protocol , 2008, RFC.
[3] Matthew J. Moyer,et al. A survey of security issues in multicast communications , 1999, IEEE Network.
[4] Ran Canetti,et al. Multicast Security (MSEC) Group Key Management Architecture , 2005, RFC.
[5] Ran Canetti,et al. Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction , 2005, RFC.
[6] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[7] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[8] David Thaler,et al. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification , 1997, RFC.
[9] Charlie Kaufman,et al. Internet Key Exchange (IKEv2) Protocol , 2005, RFC.
[10] Dino Farinacci,et al. Generic Routing Encapsulation (GRE) , 2000, RFC.
[11] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[12] Srinivasan Seshan,et al. A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..
[13] Andrea Detti,et al. Effectiveness of overlay multicasting in mobile ad-hoc network , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[14] Yakov Rekhter,et al. Use of Provider Edge to Provider Edge (PE-PE) Generic Routing Encapsulation (GRE) or IP in BGP/MPLS IP Virtual Private Networks , 2007, RFC.
[15] Min-You Wu,et al. Approaches to establishing multicast overlays , 2005, 2005 IEEE International Conference on Services Computing (SCC'05) Vol-1.
[16] Yacine Challal,et al. A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.
[17] Leonid Reyzin,et al. Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying , 2002, ACISP.