메뉴 건너뛰기




Volumn 21, Issue 8, 2002, Pages 736-749

Differentially secure multicasting and its implementation methods

Author keywords

[No Author keywords available]

Indexed keywords

CURRICULA; INTERNET; PACKET NETWORKS; SECURITY OF DATA; TELECOMMUNICATION;

EID: 0036927958     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(02)00814-3     Document Type: Article
Times cited : (7)

References (20)
  • 1
    • 85013570276 scopus 로고
    • Core-based trees (CBT): An architecture for scalable inter-domain multicast routing
    • [BFC93], 1993
    • [BFC93] T. Ballardie, P. Francis, and J. Crowcroft, 1993. "Core-based trees (CBT): An architecture for scalable inter-domain multicast routing." In Proc. ACM SIGCOMM, 1993. pp. 85-95.
    • (1993) Proc. ACM SIGCOMM , pp. 85-95
    • Ballardie, T.1    Francis, P.2    Crowcroft, J.3
  • 2
    • 56349097648 scopus 로고
    • Secure computer system: Unified Exposition and Multics Interpretation
    • [BL76], 1976, ESD-TR-75-306, March
    • [BL76] D. Bell, and L. La Padula, 1976. "Secure computer system: Unified Exposition and Multics Interpretation". MITRE Report, ESD-TR-75-306, March 1976.
    • (1976) MITRE Report
    • Bell, D.1    La Padula, L.2
  • 3
    • 0022184697 scopus 로고
    • Host groups: A multicast extension for datagram internetworks
    • [CD85], 1985, IEEE Computer Society and ACM SIGCOMM, September
    • [CD85] D.R. Cheriton and S.E. Deering, 1985. "Host Groups: A Multicast Extension for Datagram Internetworks". In 9th Data Communication Symposium, IEEE Computer Society and ACM SIGCOMM, September 1985.
    • (1985) 9th Data Communication Symposium
    • Cheriton, D.R.1    Deering, S.E.2
  • 4
    • 84957673235 scopus 로고    scopus 로고
    • New efficient and secure protocols for verifiable signature sharing and other applications
    • [CG98], 1998. In Proc. CYRPTO'98, Springer-Verlag
    • [CG98] D. Catalano and R. Gennaro, 1998. "New efficient and secure protocols for verifiable signature sharing and other applications." In Proc. CYRPTO'98, LNCS Vol. 1642, Springer-Verlag, 1998, pp.105-20.
    • (1998) LNCS , vol.1642 , pp. 105-120
    • Catalano, D.1    Gennaro, R.2
  • 6
    • 85016876571 scopus 로고
    • Multicast routing in internetworks and extended LANs
    • [D88], 1988, Stanford, CA, August
    • [D88] S. Deering, 1988. "Multicast routing in internetworks and extended LANs." In SIGCOMM '88, Stanford, CA, August 1988, pp. 55-64.
    • (1988) SIGCOMM '88 , pp. 55-64
    • Deering, S.1
  • 7
    • 0018051340 scopus 로고
    • Reverse path forwarding of broadcast packets
    • [DM78], 1978, December
    • [DM78] Y.K. Dalal and R.M. Metcalfe, 1978. "Reverse path forwarding of broadcast packets." Communications of the ACM, Vol. 21, No. 12, December 1978, pp. 1040-1048.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 1040-1048
    • Dalal, Y.K.1    Metcalfe, R.M.2
  • 9
    • 0005352931 scopus 로고    scopus 로고
    • A framework for group key management for multicast security
    • [HCD00], 2000, August draft-ietf-ipsec-gkmframework-03.txt
    • [HCD00] T. Hardjono, B. Cain and N. Dorawswamy, 2000. "A framework for group key management for multicast security". IETF Internet draft, August 2000. draft-ietf-ipsec-gkmframework-03.txt.
    • (2000) IETF Internet draft
    • Hardjono, T.1    Cain, B.2    Dorawswamy, N.3
  • 10
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • [M97] 1997
    • [M97] S. Mittra 1997. "Iolus: A framework for scalable secure multicasting". In Proc. ACM SIGCOMM, 1997.
    • (1997) Proc. ACM SIGCOMM
    • Mittra, S.1
  • 11
    • 0033356116 scopus 로고    scopus 로고
    • A survey of security issues in multicast communications
    • [MRR99], 1999, Nov/Dec
    • [MRR99] M.J. Moyer, J.R. Rao and P. Rohatgi, 1999. "A survey of security issues in multicast communications". IEEE Network, Nov/Dec 1999, pp. 12-23.
    • (1999) IEEE Network , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 13
    • 0004198635 scopus 로고    scopus 로고
    • [Pf97], 1997. New Jersey: Prentice-Hall
    • [Pf97] Charles P. Pfleeger, 1997. Security in Computing. New Jersey: Prentice-Hall, 1997.
    • (1997) Security in Computing
    • Pfleeger, C.P.1
  • 14
    • 84937412892 scopus 로고
    • Non discretionary controls for commercial applications
    • [Li82], 1982
    • [Li82] Steven B. Lipner, 1982. "Non Discretionary Controls for Commercial Applications". IEEE Symposium on Security and Privacy, 1982, pp. 2-10.
    • (1982) IEEE Symposium on Security and Privacy , pp. 2-10
    • Lipner, S.B.1
  • 15
    • 0002413598 scopus 로고    scopus 로고
    • Intra and inter-domain multicast routing protocols: A survey and a taxonomy
    • [Ra00] 2000, First Quarter
    • [Ra00] M. Ramalho 2000. "Intra and inter-domain multicast routing protocols: A survey and a taxonomy". IEEE Communications Surveys & Tutorials, Vol. 3, No. 1, First Quarter 2000, pp. 2-25.
    • (2000) IEEE Communications Surveys & Tutorials , vol.3 , Issue.1 , pp. 2-25
    • Ramalho, M.1
  • 16
    • 0012329296 scopus 로고    scopus 로고
    • KHIP - A scalable protocol for secure multicast routing
    • [SGLA99], 1999
    • [SGLA99] C. Shields and J.J. Garcia-Luna-Aceves, 1999. "KHIP - A scalable protocol for secure multicast routing." ACM SIGCOMM, 1999.
    • (1999) ACM SIGCOMM
    • Shields, C.1    Garcia-Luna-Aceves, J.J.2
  • 17
    • 0033900912 scopus 로고    scopus 로고
    • Multicast routing algorithms and protocols: A tutorial
    • [SM00], 2000, January/February
    • [SM00] L. Sahasrabuddhe and B. Mukherjee, 2000. "Multicast routing algorithms and protocols: A tutorial". IEEE Network, January/February 2000, pp. 90-102.
    • (2000) IEEE Network , pp. 90-102
    • Sahasrabuddhe, L.1    Mukherjee, B.2
  • 18
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • [WGL00], 2000, February
    • [WGL00] C.K. Wong, M. Gouda and S.S. Lam, 2000. "Secure group communications using key graphs." IEEE/ACM Transactions on Networking, Vol. 8, No. 1, February 2000, pp. 16-30.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 19
    • 0031632085 scopus 로고    scopus 로고
    • LCM: A multicast core management protocol for link-state routing networks
    • [YFM98], 1998
    • [YFM98] Y. Huang, E. Fleury and P.K. McKinley, 1998. "LCM: A multicast core management protocol for link-state routing networks." ICC, 1998, pp. 1197-1201.
    • (1998) ICC , pp. 1197-1201
    • Huang, Y.1    Fleury, E.2    McKinley, P.K.3
  • 20
    • 0012315861 scopus 로고    scopus 로고
    • Differentially secure multicasting and its implementation methods
    • [St01], 2001, a shorter version of this paper
    • [St01] S. Holeman, G. Manimaran and J. Davis, 2001. "Differentially Secure Multicasting and its Implementation Methods," in Proc. IEEE ICCCN, pp. 212-217, 2001 (a shorter version of this paper).
    • (2001) Proc. IEEE ICCCN , pp. 212-217
    • Holeman, S.1    Manimaran, G.2    Davis, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.