Notes on the CRTDH Group Key Agreement Protocol
暂无分享,去创建一个
[1] Francisco Rico-Novella,et al. Balanced batch LKH: new proposal, implementation and performance evaluation , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.
[2] Bob Briscoe,et al. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences , 1999, Networked Group Communication.
[3] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[4] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[5] Bobby Bhattacharjee,et al. Scalable secure group communication over IP multicast , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[6] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[7] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[8] Yong Guan,et al. A key pre-distribution scheme using deployment knowledge for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[9] Ashok Samal,et al. DISEC: a distributed framework for scalable secure many-to-many communication , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.
[10] Byrav Ramamurthy,et al. An Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks , 2006, MSN.
[11] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[12] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[13] Haitham S. Cruickshank,et al. Dynamic Balanced Key Tree Management for Secure Multicast Communications , 2007, IEEE Transactions on Computers.
[14] Dong Young Lee,et al. Protocol design for scalable and reliable group rekeying , 2001, SPIE ITCom.
[15] Bob Briscoe. MARKS: Multicast Key Management using Arbitrarily Revealed Key Sequences , 1999 .
[16] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[17] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[18] David K. Y. Yau,et al. Distributed collaborative key agreement protocols for dynamic peer groups , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[19] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[20] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[21] Yongdae Kim,et al. Secure Group Communication Using Robust Contributory Key Agreement , 2001 .
[22] Maarit Hietalahti. Efficient Key Agreement for Ad-hoc Networks , 2001 .
[23] Byrav Ramamurthy,et al. CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[24] Xiang-Yang Li,et al. Efficient hybrid key agreement protocol for wireless ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[25] Shivakant Mishra,et al. Mykil: a highly scalable key distribution protocol for large group multicast , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[26] David Hutchison,et al. Decentralised group key management , 2002 .
[27] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[28] Xiaozhou Li,et al. Batch rekeying for secure group communications , 2001, WWW '01.
[29] Ashok Samal,et al. A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
[30] Bernhard Plattner,et al. Efficient security for large and dynamic multicast groups , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[31] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[32] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[33] J. Ward,et al. Book Review: Proceedings of the Third International Conference on Spectral and High Order Methods@@@Book Review: An introduction to computational geometry for curves and surfaces@@@Book Review: The mathematics of surfaces@@@Book Review: Algorithmic number theory, Volume I: Efficient algorithms , 1998 .
[34] Xukai Zou,et al. DGKD: distributed group key distribution with authentication capability , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[35] Stephan Olariu,et al. Scalable cryptographic key management in wireless sensor networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[36] Sushil Jajodia,et al. Efficient and secure keys management for wireless mobile communications , 2002, POMC '02.
[37] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[38] Byrav Ramamurthy,et al. Secure Group Communications Over Data Networks , 2004 .
[39] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.