-
1
-
-
0242341057
-
Multicast group behavior in the internet's multicast backbone (Mbone)
-
June
-
K. Almeroth and M. Ammar, Multicast Group Behavior in the Internet's Multicast Backbone (Mbone), IEEE Communications, June 1997.
-
(1997)
IEEE Communications
-
-
Almeroth, K.1
Ammar, M.2
-
4
-
-
4544250297
-
Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast
-
G. Badishi, I. Keidar, and A. Sasson. Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. In Proc. of Dependable Systems and Networks (DSN), 2004.
-
(2004)
Proc. of Dependable Systems and Networks (DSN)
-
-
Badishi, G.1
Keidar, I.2
Sasson, A.3
-
5
-
-
18944405526
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
(work in progress), August
-
D. Balenson, D. McGrew, and A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (work in progress), August 2000.
-
(2000)
IETF Internet Draft
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
7
-
-
0003047061
-
Enabling conferencing applications on the internet using an overlay multicast architecture
-
Y. Chu, S. Rao, S. Seshan, and H. Zhang. Enabling conferencing applications on the internet using an overlay multicast architecture. In Proc. of ACM SIGCOMM 2001.
-
Proc. of ACM SIGCOMM 2001
-
-
Chu, Y.1
Rao, S.2
Seshan, S.3
Zhang, H.4
-
9
-
-
84861255730
-
-
http://www.mesquite.com/.
-
-
-
-
12
-
-
84975880325
-
Overcast: Reliable, multicasting with an overlay network
-
J. Jannotti, D. Gifford, K. Johnson, M. Kaashoek, and J. O'Toole. Overcast: Reliable, Multicasting with an Overlay Network. In Proc. of 4th USENIX OSDI Symposium, 2000.
-
(2000)
Proc. of 4th USENIX OSDI Symposium
-
-
Jannotti, J.1
Gifford, D.2
Johnson, K.3
Kaashoek, M.4
O'Toole, J.5
-
13
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
D. Liu, P. Ning, and K. Sun. Efficient Self-Healing Group Key Distribution with Revocation Capability. In Proc. of the 10th ACM CCS, 2003.
-
(2003)
Proc. of the 10th ACM CCS
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
16
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer-Verlag Inc. LNCS 2139
-
D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Advances in Cryptology - CRYPTO 2001. Springer-Verlag Inc. LNCS 2139, 2001, 41-62.
-
(2001)
Advances in Cryptology - CRYPTO 2001
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
17
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
Oakland CA, May
-
S. Setia, S. Koussih, S. Jajodia, and E. Harder. Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. In Proc. of the IEEE Symposium on Security and Privacy, Oakland CA, May 2000.
-
(2000)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
18
-
-
1542691227
-
A comparative performance analysis of reliable group rekey transport protocols for secure multicast
-
special issue Proceedings of Performance 2002, Rome, Italy, Sept 2002
-
S. Setia, S. Zhu and S. Jajodia. A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. In Performance Evaluation 49(1/4): 21-41 (2002), special issue Proceedings of Performance 2002, Rome, Italy, Sept 2002.
-
(2002)
Performance Evaluation
, vol.49
, Issue.1-4
, pp. 21-41
-
-
Setia, S.1
Zhu, S.2
Jajodia, S.3
-
20
-
-
0032178082
-
Secure group communication using key graphs
-
Vancouver, British Columbia
-
C. Wong, M. Gouda, S. Lam. Secure Group Communication Using Key Graphs. In Proc. of SIGCOMM 1998, Vancouver, British Columbia, 68-79.
-
Proc. of SIGCOMM 1998
, pp. 68-79
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
22
-
-
4544239383
-
HOURS: Achieving DoS resilence in an open service hierarchy
-
H. Yang, H. Luo, Y. Yang, S. Lu, and L. Zhang HOURS: Achieving DoS Resilence in an Open Service Hierarchy. In Proc. of Dependable Systems and Networks (DSN), 2004.
-
(2004)
Proc. of Dependable Systems and Networks (DSN)
-
-
Yang, H.1
Luo, H.2
Yang, Y.3
Lu, S.4
Zhang, L.5
-
24
-
-
0036343707
-
Host multicast: A framework for delivering multicast to end users
-
B. Zhang, S. Jamin, and L. Zhang. Host Multicast: a Framework for Delivering Multicast to End Users. In IEEE Infocom 2002.
-
IEEE Infocom 2002
-
-
Zhang, B.1
Jamin, S.2
Zhang, L.3
-
25
-
-
84861257111
-
Efficient security mechanisms for overlay multicast-based content distribution
-
CSE, PSU Feb.
-
S. Zhu, C. Yao, D. Liu, S. Setia, and S. Jajodia. Efficient Security Mechanisms for Overlay Multicast-based Content Distribution. Tech-report, CSE, PSU Feb., 2005. Http://www.cse.psu.edu/~szhu/overlay.pdf.
-
(2005)
Tech-report
-
-
Zhu, S.1
Yao, C.2
Liu, D.3
Setia, S.4
Jajodia, S.5
|