Dynamic Balanced Key Tree Management for Secure Multicast Communications
暂无分享,去创建一个
Haitham S. Cruickshank | Zhili Sun | Michael P. Howarth | Wee Hock Desmond Ng | Zhili Sun | W. Ng | H. Cruickshank | M. Howarth
[1] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[2] Zhili Sun,et al. Multi-layers balanced LKH , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[3] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[4] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.
[6] K. J. Ray Liu,et al. A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.
[7] Ingrid Verbauwhede,et al. The energy cost of secrets in ad-hoc networks , 2002 .
[8] Francisco Rico-Novella,et al. Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[9] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[10] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[11] Haitham S. Cruickshank,et al. Dynamics of key management in secure satellite multicast , 2004, IEEE Journal on Selected Areas in Communications.
[12] Pankaj Rohatgi,et al. Maintaining Balanced Key Trees for Secure Multicast , 1999 .
[13] Dong Young Lee,et al. Protocol design for scalable and reliable group rekeying , 2001, SPIE ITCom.
[14] Upkar Varshney. Multicast Support in Mobile Commerce Applications , 2002, Computer.
[15] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[16] Ahmet M. Eskicioglu,et al. Multimedia security in group communications: recent progress in key management, authentication, and watermarking , 2003, Multimedia Systems.
[17] Adrian Perrig,et al. Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication , 1999 .
[18] David K. Y. Yau,et al. Distributed collaborative key agreement protocols for dynamic peer groups , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[19] Sanjoy Paul,et al. Multicasting on the Internet and its Applications , 1998, Springer US.
[20] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[21] Haitham S. Cruickshank,et al. Scalable balanced batch rekeying for secure group communication , 2006, Comput. Secur..
[22] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[23] Nansi Shi,et al. Mobile Commerce Applications , 2004 .
[24] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[25] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[26] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[27] Upkar Varshney,et al. Multicast over wireless networks , 2002, CACM.
[28] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[29] T. Hardjono,et al. Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).