Secure multicast groups on ad hoc networks
暂无分享,去创建一个
Guevara Noubir | Guolong Lin | Tansel Kaya | Atilay Yilmaz | G. Noubir | G. Lin | T. Kaya | A. Yilmaz
[1] Yang Richard Yang,et al. Reliable group rekeying: a performance analysis , 2001, SIGCOMM 2001.
[2] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[3] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] G. Noubir,et al. Key management for simultaneous join/leave in secure multicast , 2002, Proceedings IEEE International Symposium on Information Theory,.
[5] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[6] Li Gong,et al. Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.
[7] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[8] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[9] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[10] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[11] Donald F. Towsley,et al. Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.
[12] Radha Poovendran,et al. Energy-aware secure multicast communication in ad-hoc networks using geographic location information , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[13] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[14] David A. Cooper. A more efficient use of delta-CRLs , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] Refik Molva,et al. Scalable multicast security with dynamic recipient groups , 2000, TSEC.
[17] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[18] Danilo Bruschi,et al. Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues , 2002, Mob. Networks Appl..
[19] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[20] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[21] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[22] John S. Baras,et al. An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes , 1999, CRYPTO.
[23] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[24] Diane Kiwior,et al. Key management for secure multicast group communication in mobile networks , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[25] G. Noubir,et al. Security issues in Internet protocols over satellite links , 1999, Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No.99CH36324).
[26] Guevara Noubir. A Scalable Key-Distribution Scheme for Dynamic Multicast Groups , 1999 .
[27] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[28] Adrian Perrig,et al. Secure broadcast communication in wired and wireless networks , 2002 .
[29] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[30] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[31] Ralph Arnote,et al. Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.
[32] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[33] Guevara Noubir,et al. Optimal tree structure for key management of simultaneous join/leave in secure multicast , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[34] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[35] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[36] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[37] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.