Elements of trusted multicasting
暂无分享,去创建一个
[1] Deborah Estrin,et al. Visa protocols for controlling interorganizational datagram flow , 1989, IEEE J. Sel. Areas Commun..
[2] Willy Zwaenepoel,et al. Distributed process groups in the V Kernel , 1985, TOCS.
[3] Kenneth P. Birman,et al. Reliable communication in the presence of failures , 1987, TOCS.
[4] Michael K. Reiter,et al. Preventing denial and forgery of causal relationships in distributed systems , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Jon Crowcroft,et al. Core Based Trees (CBT) An Architecture for Scalable Inter-Domain Multicast Routing , 1993, SIGCOMM 1993.
[6] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[7] Martín Abadi,et al. Prudent Engineering Practice for Cryptographic Protocols , 1994, IEEE Trans. Software Eng..
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[9] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[10] Stephen E. Deering,et al. Multicast routing in datagram internetworks and extended LANs , 1990, TOCS.
[11] Nachum Shacham,et al. Multicast routing of hierarchical data , 1992, [Conference Record] SUPERCOMM/ICC '92 Discovering a New World of Communications.
[12] Claudio Topolcic,et al. Experimental Internet Stream Protocol: Version 2 (ST-II) , 1990, RFC.