메뉴 건너뛰기




Volumn 3531, Issue , 2005, Pages 40-55

Efficient security mechanisms for overlay multicast-based content distribution

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH; COMPUTER ARCHITECTURE; DATA REDUCTION; KNOWLEDGE BASED SYSTEMS; MULTICASTING; MULTIMEDIA SYSTEMS; PROBABILITY; TOPOLOGY; WEBSITES;

EID: 26444516551     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496137_4     Document Type: Conference Paper
Times cited : (4)

References (25)
  • 1
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the internet's multicast backbone (Mbone)
    • June
    • K. Almeroth and M. Ammar, Multicast Group Behavior in the Internet's Multicast Backbone (Mbone), IEEE Communications, June 1997.
    • (1997) IEEE Communications
    • Almeroth, K.1    Ammar, M.2
  • 4
    • 4544250297 scopus 로고    scopus 로고
    • Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast
    • G. Badishi, I. Keidar, and A. Sasson. Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. In Proc. of Dependable Systems and Networks (DSN), 2004.
    • (2004) Proc. of Dependable Systems and Networks (DSN)
    • Badishi, G.1    Keidar, I.2    Sasson, A.3
  • 5
    • 18944405526 scopus 로고    scopus 로고
    • Key management for large dynamic groups: One-way function trees and amortized initialization
    • (work in progress), August
    • D. Balenson, D. McGrew, and A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. IETF Internet draft (work in progress), August 2000.
    • (2000) IETF Internet Draft
    • Balenson, D.1    McGrew, D.2    Sherman, A.3
  • 7
    • 0003047061 scopus 로고    scopus 로고
    • Enabling conferencing applications on the internet using an overlay multicast architecture
    • Y. Chu, S. Rao, S. Seshan, and H. Zhang. Enabling conferencing applications on the internet using an overlay multicast architecture. In Proc. of ACM SIGCOMM 2001.
    • Proc. of ACM SIGCOMM 2001
    • Chu, Y.1    Rao, S.2    Seshan, S.3    Zhang, H.4
  • 9
    • 84861255730 scopus 로고    scopus 로고
    • http://www.mesquite.com/.
  • 13
    • 3543050471 scopus 로고    scopus 로고
    • Efficient self-healing group key distribution with revocation capability
    • D. Liu, P. Ning, and K. Sun. Efficient Self-Healing Group Key Distribution with Revocation Capability. In Proc. of the 10th ACM CCS, 2003.
    • (2003) Proc. of the 10th ACM CCS
    • Liu, D.1    Ning, P.2    Sun, K.3
  • 16
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • Springer-Verlag Inc. LNCS 2139
    • D. Naor, M. Naor, and J. Lotspiech. Revocation and Tracing Schemes for Stateless Receivers. In Advances in Cryptology - CRYPTO 2001. Springer-Verlag Inc. LNCS 2139, 2001, 41-62.
    • (2001) Advances in Cryptology - CRYPTO 2001 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 18
    • 1542691227 scopus 로고    scopus 로고
    • A comparative performance analysis of reliable group rekey transport protocols for secure multicast
    • special issue Proceedings of Performance 2002, Rome, Italy, Sept 2002
    • S. Setia, S. Zhu and S. Jajodia. A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. In Performance Evaluation 49(1/4): 21-41 (2002), special issue Proceedings of Performance 2002, Rome, Italy, Sept 2002.
    • (2002) Performance Evaluation , vol.49 , Issue.1-4 , pp. 21-41
    • Setia, S.1    Zhu, S.2    Jajodia, S.3
  • 20
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communication using key graphs
    • Vancouver, British Columbia
    • C. Wong, M. Gouda, S. Lam. Secure Group Communication Using Key Graphs. In Proc. of SIGCOMM 1998, Vancouver, British Columbia, 68-79.
    • Proc. of SIGCOMM 1998 , pp. 68-79
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 24
    • 0036343707 scopus 로고    scopus 로고
    • Host multicast: A framework for delivering multicast to end users
    • B. Zhang, S. Jamin, and L. Zhang. Host Multicast: a Framework for Delivering Multicast to End Users. In IEEE Infocom 2002.
    • IEEE Infocom 2002
    • Zhang, B.1    Jamin, S.2    Zhang, L.3
  • 25
    • 84861257111 scopus 로고    scopus 로고
    • Efficient security mechanisms for overlay multicast-based content distribution
    • CSE, PSU Feb.
    • S. Zhu, C. Yao, D. Liu, S. Setia, and S. Jajodia. Efficient Security Mechanisms for Overlay Multicast-based Content Distribution. Tech-report, CSE, PSU Feb., 2005. Http://www.cse.psu.edu/~szhu/overlay.pdf.
    • (2005) Tech-report
    • Zhu, S.1    Yao, C.2    Liu, D.3    Setia, S.4    Jajodia, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.