Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction
暂无分享,去创建一个
Wang Bin | Francisco Rico-Novella | Josep Pegueroles | Miguel Soriano | J. Pegueroles | F. Rico-Novella | M. Soriano | Wang Bin | Francisco Rico-Novella
[1] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[2] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[3] Ran Canetti,et al. Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.
[4] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[5] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[6] J. Hernandez-Serrano,et al. GKM over large MANET , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[7] Eric Harder,et al. Logical Key Hierarchy Protocol , 1999 .
[8] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[9] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[10] Ian Foster,et al. The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.