Novel rekeying approach for secure multiple multicast groups over wireless mobile networks
暂无分享,去创建一个
[1] Trust TshepoMapoka. Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .
[2] Yacine Challal,et al. Key management with host mobility in dynamic groups , 2010, SIN.
[3] Miss Laiha Mat Kiah,et al. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments , 2007, Future Generation Communication and Networking (FGCN 2007).
[4] Charles E. Perkins,et al. Context Transfer Protocol (CXTP) , 2005, RFC.
[5] Donald F. Towsley,et al. Comparison of inter-area rekeying algorithms for secure wireless group communications , 2002, Perform. Evaluation.
[6] Sheila Frankel,et al. Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec , 2007, RFC.
[7] David Hutchison,et al. A survey of key management for secure group communication , 2003, CSUR.
[8] Transcoding Functions,et al. Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; , 2009 .
[9] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[10] Yacine Challal,et al. Group Key Management Protocols: A Novel Taxonomy , 2008 .
[11] Hugh Harney,et al. Group Key Management Protocol (GKMP) Specification , 1997, RFC.
[12] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[14] Trust T. Mapoka,et al. Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey , 2013 .
[15] T. Hardjono,et al. Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).