Adaptive Rekeying for Secure Group Communication Using Key Management Technique
暂无分享,去创建一个
[1] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[2] J. Limb,et al. Editorial on the IEEE/OSA Journal of Lightwave Technology and the IEEE Journal on Selected Areas in Communications , 1986 .
[3] Lixia Zhang,et al. Host multicast: a framework for delivering multicast to end users , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[4] Sandeep S. Kulkarni,et al. Adaptive Rekeying for Secure Multicast , 2003 .
[5] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[6] Haitham S. Cruickshank,et al. Dynamic Balanced Key Tree Management for Secure Multicast Communications , 2007, IEEE Transactions on Computers.
[7] John S. Baras,et al. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes , 2001, IEEE Trans. Inf. Theory.
[8] Guevara Noubir,et al. Optimal tree structure for key management of simultaneous join/leave in secure multicast , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[9] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[10] Reihaneh Safavi-Naini,et al. Efficient Revocation Schemes for Secure Multicast , 2001, ICISC.
[11] Ivan Hal Sudborough,et al. Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[12] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[13] Srinivasan Seshan,et al. A case for end system multicast , 2002, IEEE J. Sel. Areas Commun..