메뉴 건너뛰기




Volumn 2, Issue , 1999, Pages 708-716

Multicast security: A taxonomy and some efficient constructions

Author keywords

[No Author keywords available]

Indexed keywords

COMPLEX PROBLEMS; EFFICIENT CONSTRUCTION; KEY REVOCATION; MESSAGE AUTHENTICATION CODES; MULTICAST COMMUNICATION; MULTICAST PROTOCOL; MULTICAST SCENARIOS; MULTICAST SECURITY; MULTICASTS; SECURITY MECHANISM; SECURITY PROBLEMS; SECURITY PROTOCOLS; SOURCE AUTHENTICATION; UNICAST;

EID: 0032661699     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.1999.751457     Document Type: Conference Paper
Times cited : (637)

References (30)
  • 2
    • 0013427153 scopus 로고
    • Probabilistic methods in external finite set theory
    • N. Alon, "Probabilistic Methods in External Finite Set Theory", in Extremal Problems for Finite Sets, 1991, 39-57.
    • (1991) Extremal Problems for Finite Sets , pp. 39-57
    • Alon, N.1
  • 4
  • 5
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali, "How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits", SIAM J. on Comp., 13, 1984, 850-864.
    • (1984) SIAM J. on Comp. , vol.13 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 0013001552 scopus 로고    scopus 로고
    • Proactive security: Long-term protection against break-ins
    • Sprint
    • R. Canetti. R. Gennaro. D. Herzberg and D. Naor, "Proactive Security: Long-term protection against break-ins", Crypto Bytes, Vol. 3, No. 1, Sprint 1997.
    • (1997) Crypto Bytes , vol.3 , Issue.1
    • Herzberg, R.1    Canetti, R.2    Gennaro, D.3    Naor, D.4
  • 9
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • LNCS, Springer-Verlag
    • Y. Desmedt and Y. Frankel,'Threshold cryptosystems". Advances in Cryptology - Crypto'89, LNCS vol. 435, Springer-Verlag, 1990, pp. 307- 315.
    • (1990) Advances in Cryptology - Crypto'89 , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 10
    • 0026992399 scopus 로고    scopus 로고
    • Multi-receiver/Multi-sender network security: Efficient authenticated multicast/feedback
    • Y. Desmedt, Y. Frankel and M. Yung, "Multi-receiverMulti-sender network security: efficient authenticated multicastlfeedback", IEEE Infocom'92. pp. 2045-2054.
    • IEEE Infocom'92 , pp. 2045-2054
    • Desmedt, Y.1    Frankel, Y.2    Yung, M.3
  • 13
    • 0011000478 scopus 로고    scopus 로고
    • An introduction to threshold cryptography
    • Winter
    • Gemmel P., "An introduction to threshold cryptography", in CrypfoByres, Winter 1997, 7-12.
    • (1997) CrypfoByres , pp. 7-12
    • Gemmel, P.1
  • 16
    • 0003285503 scopus 로고    scopus 로고
    • Group key management protocol (GKMP) architecture
    • July
    • Hamey H. and Muckenhim C., "Group Key Management Protocol (GKMP) Architecture", RFC 2094. July 1997.
    • (1997) RFC 2094
    • Hamey, H.1    Muckenhim, C.2
  • 17
    • 84902476908 scopus 로고    scopus 로고
    • URL
    • IP Security Protocol (ipsec), IETF working group. URL: http://www.ietf.org/html.charters/ipsec-charter.html.
    • IP Security Protocol (Ipsec)
  • 19
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • February
    • H. Krawczyk, M. Bellare and R. Canetti, "HMAC: Keyed-Hashing for Message Authentication", RFC 2104, February 1997.
    • (1997) RFC 2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 22
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Cannes, France, Sept.
    • S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting", Proc. of the ACM SIGCOMM'97, Cannes, France, Sept. 1997.
    • (1997) Proc. of the ACM SIGCOMM'97
    • Mittra, S.1
  • 23
    • 84957617971 scopus 로고    scopus 로고
    • From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACS
    • LNCS vol. 1462, Springer-Verlag
    • M. Naor and O. Reingold, "From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACS", Advances in Cryprology - Crypro'98, LNCS vol. 1462, Springer-Verlag, 1998, pp. 267-282.
    • (1998) Advances in Cryprology - Crypro'98 , pp. 267-282
    • Naor, M.1    Reingold, O.2
  • 24
    • 0003195066 scopus 로고
    • The MD5 message digest algorithm
    • April
    • R. L. Rivest, The MD5 Message Digest Algorithm, RFC 1321, April 1992.
    • (1992) RFC 1321
    • Rivest, R.L.1
  • 25
    • 84957715332 scopus 로고    scopus 로고
    • New results on multi-receiver authentication code
    • LNCS vol. 1403, Springer-Verlag
    • R. Safavi-Naini and H. Wang, "New results on Multi-receiver Authentication Code, " Advances in Cryptology - EVROCRYPT'98, LNCS vol. 1403, Springer-Verlag, 1998, pp. 527-541.
    • (1998) Advances in Cryptology - EVROCRYPT'98 , pp. 527-541
    • Safavi-Naini, R.1    Wang, H.2
  • 29
    • 0002360030 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C.K. Wong, M. Gouda and S. Lam, "Secure Group Communications Using Key Graphs", Sigcomm'98.
    • Sigcomm'98
    • Wong, C.K.1    Gouda, M.2    Lam, S.3
  • 30
    • 0003976197 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • The University of Texas at Austin, July, 1998
    • C.K. Wong and S. Lam, "Digital Signatures for Flows and Multicasts", The University of Texas at Austin, Department of Computer Sciences, Technical Report TR-98-15.Ju ly 1998. 1998, pp. 267-282.
    • (1998) Department of Computer Sciences, Technical Report TR-98-15 , pp. 267-282
    • Wong, C.K.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.