Secure Group Communication for Mobile P2P Groups: A Survey
暂无分享,去创建一个
[1] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[2] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[3] Michael K. Reiter,et al. Integrating security in a group oriented distributed system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Kenneth P. Birman,et al. The process group approach to reliable distributed computing , 1992, CACM.
[5] Michael K. Reiter,et al. The Rampart Toolkit for Building High-Integrity Services , 1994, Dagstuhl Seminar on Distributed Systems.
[6] Michael K. Reiter,et al. How to securely replicate services , 1992, TOPL.
[7] Louise E. Moser,et al. The Totem single-ring ordering and membership protocol , 1995, TOCS.
[8] Robbert van Renesse,et al. Horus: a flexible group communication system , 1996, CACM.
[9] Danny Dolev,et al. The Transis approach to high availability cluster communication , 1996, CACM.
[10] Li Gong,et al. Enclaves: Enabling Secure Collaboration Over the Internet , 1996, IEEE J. Sel. Areas Commun..
[11] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[12] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[13] Roberto Baldoni,et al. Architecture for group communication in mobile systems , 1998, Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281).
[14] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[15] L. Dondeti,et al. A Distributed Group Key Management Scheme for Secure Many-to-many Communication , 1999 .
[16] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[17] ProtocolsLakshminath R. Dondeti. Survey and Comparison of Secure Group Communication , 1999 .
[18] Danny Dolev,et al. Optimized Group Rekey for Group Communications Systems , 1999 .
[19] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[20] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[21] Antoine Joux. A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.
[22] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[23] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[24] Tuomas Aura,et al. Towards a Survivable Security Architecture for Ad-Hoc Networks , 2001, Security Protocols Workshop.
[25] Idit Keidar,et al. Group communication specifications: a comprehensive study , 2001, CSUR.
[26] Gruia-Catalin Roman,et al. Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.
[27] Danny Dolev,et al. The architecture and performance of security protocols in the ensemble group communication system: Using diamonds to guard the castle. , 2001 .
[28] Louise E. Moser,et al. The SecureRing group communication system , 2001, TSEC.
[29] Yongdae Kim,et al. On the performance of group key agreement protocols , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[30] Mohamed Eltoweissy,et al. Multi-level secure multicast: the rethinking of secure locks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[31] Günter Hommel,et al. Localized group membership service for ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[32] Abdelsalam Helal,et al. An efficient algorithm for maintaining consistent group membership in ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[33] Colin Boyd,et al. Round-Optimal Contributory Conference Key Agreement , 2003, Public Key Cryptography.
[34] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[35] Roy Friedman,et al. Fuzzy Group Membership , 2003, Future Directions in Distributed Computing.
[36] Raghav Bhaskar. Group Key Agreement in Ad hoc Networks , 2003 .
[37] Antonio Corradi,et al. AGAPE: a location-aware group membership middleware for pervasive computing environments , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[38] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[39] Kwangjo Kim,et al. An Efficient Tree-Based Group Key Agreement Using Bilinear Map , 2003, ACNS.
[40] Shivakant Mishra,et al. Flexible intrusion tolerant group membership protocol , 2004, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004..
[41] Ratna Dutta,et al. Provably Secure Authenticated Tree Based Group Key Agreement , 2004, ICICS.
[42] Patrick Th. Eugster,et al. Pilot: probabilistic lightweight group communication system for ad hoc networks , 2004, IEEE Transactions on Mobile Computing.
[43] Christian Rohner. Building Secure Communities in Spontaneously Networked Environments , 2004 .
[44] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[45] Gene Tsudik,et al. Group key agreement efficient in communication , 2004, IEEE Transactions on Computers.
[46] Mark Manulis,et al. Contributory group key agreement protocols, revisited for mobile ad-hoc groups , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[47] Yacine Challal,et al. Group Communication Security , 2005 .
[48] Françoise Sailhan,et al. Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.
[49] Yvo Desmedt,et al. A secure and scalable Group Key Exchange system , 2005, Inf. Process. Lett..
[50] Jim Alves-Foss,et al. Performance of Group Key Agreement Protocols over Multiple Operations , 2005, IASTED PDCS.
[51] Valérie Issarny,et al. An efficient group key agreement protocol for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[52] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[53] Gene Tsudik,et al. Secure spread: an integrated architecture for secure group communication , 2005, IEEE Transactions on Dependable and Secure Computing.
[54] Ratna Dutta,et al. Overview of Key Agreement Protocols , 2005, IACR Cryptol. ePrint Arch..
[55] Jennifer L. Welch,et al. Random Walk for Self-Stabilizing Group Communication in Ad Hoc Networks , 2006, IEEE Trans. Mob. Comput..
[56] Roy Friedman,et al. Practical Byzantine Group Communication , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[57] Roy Friedman,et al. RaWMS -: random walk based lightweight membership service for wireless ad hoc network , 2006, MobiHoc '06.
[58] Mark Manulis,et al. Security-Focused Survey on Group Key Exchange Protocols , 2006, IACR Cryptol. ePrint Arch..