Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues
暂无分享,去创建一个
[1] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[2] Tomasz Imielinski,et al. Impact of mobility on distributed computations , 1993, OPSR.
[3] Yvo Desmedt,et al. Efficient and Secure Conference-Key Distribution , 1996, Security Protocols Workshop.
[4] Dan Harkins,et al. The Internet Key Exchange (IKE) , 1998, RFC.
[5] Hugh Harney,et al. Group Key Management Protocol (GKMP) Architecture , 1997, RFC.
[6] Amos Fiat,et al. Broadcast Encryption , 1993, CRYPTO.
[7] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[8] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[9] B. R. Badrinath,et al. A framework for delivering multicast messages in networks with mobile hosts , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[10] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[11] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[12] Ashar Aziz,et al. SKIP-securing the Internet , 1996, Proceedings of WET ICE '96. IEEE 5th Workshop on Enabling Technologies; Infrastucture for Collaborative Enterprises.
[13] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[14] Hideki Imai,et al. On the Key Predistribution System: A Practical Solution to the Key Distribution Problem , 1987, CRYPTO.
[15] Gene Tsudik,et al. Cliques: a protocol suite for key agreement in dynamic groups , 1997 .
[16] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[17] B. R. Badrinath,et al. A framework for delivering multicast messages in networks with mobile hosts , 1996, Mob. Networks Appl..
[18] Tomasz Imielinski,et al. Mobile wireless computing: challenges in data management , 1994, CACM.
[19] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[20] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[21] Stephen E. Deering,et al. Multicast routing in internetworks and extended LANs , 1988, SIGCOMM '88.
[22] Don Brutzman,et al. MBONE, the Multicast BackbONE , 1994 .
[23] Peter S. Kruus,et al. A Survey of Multicast Security Issues and Architectures , 1998 .
[24] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[25] Li Gong,et al. Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.
[26] B. R. Badrinath,et al. IP multicast extensions for mobile internetworking , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[27] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[28] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.