Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Reduction in control overhead for a secure, scalable framework for mobile multicast , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[2] Abdelmadjid Bouabdallah,et al. IP mobile multicast: Challenges and solutions , 2004, IEEE Communications Surveys & Tutorials.
[3] Akihiro Shimizu,et al. Simple And Secure password authentication protocol, ver.2(SAS-2) (メディア工学) , 2002 .
[4] Yacine Challal,et al. Adaptive Group Key Management Protocol for Wireless Communications , 2012, J. Univers. Comput. Sci..
[5] Claude Castelluccia,et al. Hierarchical Mobile IPv6 (HMIPv6) Mobility Management , 2008, RFC.
[6] Charles E. Perkins,et al. IP Mobility Support for IPv4 , 2002, RFC.
[7] Jeng-Farn Lee,et al. MKMS: Multicast key management scheme for Proxy Mobile IPv6 networks , 2011, 2011 International Conference on Consumer Electronics, Communications and Networks (CECNet).
[8] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[9] K. J. Ray Liu,et al. An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[10] Basavaraj Patil,et al. Proxy Mobile IPv6 , 2008, RFC.
[11] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[12] Yacine Challal,et al. Key management with host mobility in dynamic groups , 2010, SIN.
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[14] Yiling Wang,et al. Efficient Key Management for Secure Wireless Multicast , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[15] Hongke Zhang,et al. Multicast Extension Support for Proxy MIPv6 , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[16] Yong Cheng,et al. HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast , 2007, 2007 International Conference on Networking, Architecture, and Storage (NAS 2007).
[17] Miss Laiha Mat Kiah,et al. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).
[18] Donald F. Towsley,et al. Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.
[19] Thomas Hardjono,et al. Multicast and Group Security , 2003 .
[20] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[21] Matu-Tarow Noda,et al. Simple and Secure Password Authentication Protocol (SAS) , 2000 .
[22] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[23] Alireza Nemaney Pour,et al. CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement , 2012, ArXiv.
[24] Ashok Samal,et al. Scalable secure one-to-many group communication using dual encryption , 2000, Comput. Commun..
[25] Suresh Singh,et al. RelM: reliable multicast for mobile networks , 1998, Comput. Commun..
[26] T. Hardjono,et al. Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[27] Xiulin Hu,et al. A Survey of Group Key Management , 2008, 2008 International Conference on Computer Science and Software Engineering.
[28] Miss Laiha Mat Kiah,et al. An Implementation of Secure Group Communication in a Wireless Environment , 2012 .
[29] K. J. Ray Liu,et al. Topology-aware key management schemes for wireless multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[30] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[31] Kyoon-Ha Lee,et al. Key management scheme for providing the confidentiality in mobile multicast , 2006, 2006 8th International Conference Advanced Communication Technology.
[32] Elina Eidkhani,et al. A New Group Key Management Protocol Using Code for Key Calculation: CKC , 2010, 2010 International Conference on Information Science and Applications.
[33] Yiling Wang,et al. Hybrid Group Key Management Scheme for Secure Wireless Multicast , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).