Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[2] Haiyun Luo,et al. HOURS: achieving DoS resilience in an open service hierarchy , 2004, International Conference on Dependable Systems and Networks, 2004.
[3] Jun Li,et al. Resilient self-organizing overlay networks for security update delivery , 2004, IEEE Journal on Selected Areas in Communications.
[4] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[5] Chris Mitchell,et al. Security defects in CCITT recommendation X.509: the directory authentication framework , 1990, CCRV.
[6] Bobby Bhattacharjee,et al. Scalable application layer multicast , 2002, SIGCOMM '02.
[7] Pankaj Rohatgi,et al. A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.
[8] Dirk Fox,et al. Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.
[9] Bryan Ford,et al. Peer-to-Peer Communication Across Network Address Translators , 2005, USENIX Annual Technical Conference, General Track.
[10] Mostafa H. Ammar,et al. Gothic: a group access control architecture for secure multicast and anycast , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[11] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[12] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[14] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[16] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[17] K. C. Almeroth,et al. Multicast group behavior in the Internet's multicast backbone (MBone) , 1997 .
[18] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[19] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM '01.
[20] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[21] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM 2001.
[22] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[23] Aravind Srinivasan,et al. Resilient multicast using overlays , 2003, IEEE/ACM Transactions on Networking.
[24] Yang Richard Yang,et al. Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.
[25] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[26] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[27] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[28] Dawn Xiaodong Song,et al. Expander graphs for digital stream authentication and robust overlay networks , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[29] Idit Keidar,et al. Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast , 2004, IEEE Transactions on Dependable and Secure Computing.
[30] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[31] Sushil Jajodia,et al. A comparative performance analysis of reliable group rekey transport protocols for secure multicast , 2002, Perform. Evaluation.
[32] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[33] Vincent Roca,et al. Impact of simple cheating in application-level multicast , 2004, IEEE INFOCOM 2004.
[34] M. Handley. An Examination of MBone Performance , 1997 .
[35] Kirk L. Johnson,et al. Overcast: reliable multicasting with on overlay network , 2000, OSDI.
[36] Hui Zhang,et al. A case for end system multicast (keynote address) , 2000, SIGMETRICS '00.
[37] Jonathan K. Millen,et al. Efficient fault-tolerant certificate revocation , 2000, CCS.
[38] Lixia Zhang,et al. Host multicast: a framework for delivering multicast to end users , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[39] Samir Khuller,et al. Construction of an efficient overlay multicast infrastructure for real-time applications , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).