Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions
暂无分享,去创建一个
[1] Guevara Noubir,et al. Secure multicast groups on ad hoc networks , 2003, SASN '03.
[2] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM '01.
[3] Srinivasan Seshan,et al. Enabling conferencing applications on the internet using an overlay muilticast architecture , 2001, SIGCOMM 2001.
[4] Bob Briscoe,et al. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences , 1999, Networked Group Communication.
[5] Steven McCanne,et al. A reliable multicast framework for light-weight sessions and application level framing , 1995, SIGCOMM '95.
[6] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[7] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[8] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[9] ZHANGLi-xia,et al. A reliable multicast framework for light-weight sessions and application level framing , 1995 .
[10] A. J. McAuley. Reliable broadband communication using a burst erasure correcting code , 1990, SIGCOMM 1990.
[11] Sushil Jajodia,et al. A comparative performance analysis of reliable group rekey transport protocols for secure multicast , 2002, Perform. Evaluation.
[12] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[13] Bobby Bhattacharjee,et al. Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[14] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[15] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[17] Sushil Jajodia,et al. LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.
[18] Christopher McCubbin,et al. Probabilistic Optimization of LKH-based Multicast Key Distribution Schemes , 2001 .
[19] Eric Harder,et al. Logical Key Hierarchy Protocol , 1999 .
[20] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[21] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[22] S. Zhu,et al. GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[23] Sushil Jajodia,et al. Performance optimizations for group key management schemes , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[24] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[25] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[26] Sanjoy Paul,et al. RMTP: a reliable multicast transport protocol , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[27] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[28] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[29] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[30] Yang Richard Yang,et al. Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.
[31] Sushil Jajodia,et al. Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast , 2003, Networked Group Communication.