-
1
-
-
85016876571
-
Multicast routing in Internetworks and extended LAN's
-
Aug.
-
S.E. Deering, "Multicast routing in internetworks and extended LAN's," in Proc. ACM SIGCOMM, Aug. 1988, pp. 55-64.
-
(1988)
Proc. ACM SIGCOMM
, pp. 55-64
-
-
Deering, S.E.1
-
2
-
-
0003701069
-
-
Ph.D. dissertation, Stanford Univ., Palo Alto, CA
-
_, "Multicast Routing in a Datagram Internetwork," Ph.D. dissertation, Stanford Univ., Palo Alto, CA, 1991.
-
(1991)
Multicast Routing in a Datagram Internetwork
-
-
-
3
-
-
85013570276
-
Core based trees (CBT): An architecture for scalable inter-domain multicast routing
-
Oct.
-
A. Ballardie, P. Francis, and J. Crowcroft, "Core based trees (CBT): An architecture for scalable inter-domain multicast routing," in Proc. ACM SIGCOMM, Oct. 1993, pp. 85-95.
-
(1993)
Proc. ACM SIGCOMM
, pp. 85-95
-
-
Ballardie, A.1
Francis, P.2
Crowcroft, J.3
-
4
-
-
85030150607
-
An arcitecture for wide-area multicast routing
-
London, U.K., Sept.
-
S.E. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, and L. Wei, "An arcitecture for wide-area multicast routing," in Proc. ACM SIC COMM, London, U.K., Sept. 1994, pp. 126-135.
-
(1994)
Proc. ACM SIC COMM
, pp. 126-135
-
-
Deering, S.E.1
Estrin, D.2
Farinacci, D.3
Jacobson, V.4
Liu, C.5
Wei, L.6
-
5
-
-
0001839723
-
Authenticated key exchange and secure interactive communication
-
W. Diffie, "Authenticated key exchange and secure interactive communication," in Proc. SECURICOM, 1990, pp. 300-306.
-
(1990)
Proc. SECURICOM
, pp. 300-306
-
-
Diffie, W.1
-
6
-
-
0033893174
-
Secure group communication using key graphs
-
Feb.
-
C.K. Wong, M. Gouda, and S.S. Lam, "Secure group communication using key graphs," IEEE/ACM Trans. Networking, vol. 8, pp. 16-29, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Networking
, vol.8
, pp. 16-29
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
7
-
-
0003259063
-
Key management for multicast: Issues and architectures
-
June
-
D.M. Wallner, E.J. Harder, and R.C. Agee, "Key management for multicast: Issues and architectures," in RFC 2627, June 1999.
-
(1999)
RFC
, vol.2627
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
8
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, C. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. IEEE INFOCOM '99 - 18th Annual Joint Conf. IEEE Computer and Communications Societies, vol. 2, 1999, pp. 708-716.
-
(1999)
Proc. IEEE INFOCOM '99 - 18th Annual Joint Conf. IEEE Computer and Communications Societies
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, C.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
9
-
-
0032627571
-
Key management for secure Internet multicast using boolean function minimization techniques
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key management for secure Internet multicast using boolean function minimization techniques," in Proc. IEEE INFOCOM '99-Conf Computer Communications, vol. 2, 1999, pp. 689-698.
-
(1999)
Proc. IEEE INFOCOM '99-Conf Computer Communications
, vol.2
, pp. 689-698
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
10
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption," in Proc. Advances in Cryptology - EUROCRYPT '99-Int. Conf. Theory and Applications of Cryptographic Techniques, 1999, pp. 459-474.
-
(1999)
Proc. Advances in Cryptology - EUROCRYPT '99-Int. Conf. Theory and Applications of Cryptographic Techniques
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
11
-
-
0003396988
-
-
IETF, draft-irtf-smug-key-tree-balance-00.txt
-
M.J. Moyer, J.R. Rao, and P. Rohatgi, "Maintaining Balanced Key Trees for Secure Multicast, Internet Draft," IETF, draft-irtf-smug-key-tree-balance-00.txt, 1999.
-
(1999)
Maintaining Balanced Key Trees for Secure Multicast, Internet Draft
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
12
-
-
3142673923
-
-
IETF, draft-selcuk-probabilistic-lkh-00.txt
-
A. Selcuk, A. McCubbin, and D. Sidhu, "Probabilistic Optimization of LKH-Based Mulitcast Key Distribution Schemes, Internet Draft," IETF, draft-selcuk-probabilistic-lkh-00.txt, 2000.
-
(2000)
Probabilistic Optimization of LKH-Based Mulitcast Key Distribution Schemes, Internet Draft
-
-
Selcuk, A.1
McCubbin, A.2
Sidhu, D.3
-
14
-
-
0031629148
-
Cliques: A new approach to group key agreement
-
Amsterdam, Netherlands, May
-
_, "Cliques: A new approach to group key agreement," in Proc. 18th Int. Conf. Distributed Computing Systems, Amsterdam, Netherlands, May 1998, pp. 380-387.
-
(1998)
Proc. 18th Int. Conf. Distributed Computing Systems
, pp. 380-387
-
-
-
15
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug.
-
C.H. Chiou and W.T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Software Eng., vol. 15, pp. 929-934, Aug. 1989.
-
(1989)
IEEE Trans. Software Eng.
, vol.15
, pp. 929-934
-
-
Chiou, C.H.1
Chen, W.T.2
-
16
-
-
0011064825
-
-
IETF, draft-ietf-msec-gdoi-04.txt
-
M. Baugher, T. Hardjono, H. Harney, and B. Weis, "The Group Domain of Interpretation, Internet Draft," IETF, draft-ietf-msec-gdoi-04.txt, 2002.
-
(2002)
The Group Domain of Interpretation, Internet Draft
-
-
Baugher, M.1
Hardjono, T.2
Harney, H.3
Weis, B.4
-
17
-
-
0003357112
-
Internet security association and key management protocol
-
D. Maughan, M. Schertler, M. Schneider, and J. Turner, "Internet security association and key management protocol," in RFC 2048, 1998.
-
(1998)
RFC
, vol.2048
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
18
-
-
0003272021
-
The Internet key exchange
-
D. Harkins and D. Carrel, "The internet key exchange," in RFC 2049, 1998.
-
(1998)
RFC
, vol.2049
-
-
Harkins, D.1
Carrel, D.2
-
19
-
-
0003622855
-
-
Ph.D. dissertation, MIT, Cambridge, MA
-
D.S. Johnson, "Near-Optimal Bin Packing Algorithms," Ph.D. dissertation, MIT, Cambridge, MA, 1973.
-
(1973)
Near-Optimal Bin Packing Algorithms
-
-
Johnson, D.S.1
-
20
-
-
0002296629
-
A new proof for the first-fit decreasing bin-packing algorithm
-
B.S. Baker, "A new proof for the first-fit decreasing bin-packing algorithm," J. Algorithms, vol. 6, pp. 49-70, 1985.
-
(1985)
J. Algorithms
, vol.6
, pp. 49-70
-
-
Baker, B.S.1
|