-
1
-
-
0242341057
-
Multicast group behavior in the Internet's Multicast Backbone (Mbone)
-
Almeroth K., and Ammar M. Multicast group behavior in the Internet's Multicast Backbone (Mbone). IEEE Communications (1997)
-
(1997)
IEEE Communications
-
-
Almeroth, K.1
Ammar, M.2
-
2
-
-
33846591538
-
-
S. Banerjee, B. Bhattacharjee, C. Kommareddy, Scalable application layer multicast, in: Proceedings of ACM SIGCOMM, 2002.
-
-
-
-
3
-
-
33846637945
-
-
S. Banerjee, S. Lee, B. Bhattacharjee, A. Srinivasan, Resilient multicast using overlays, in: Proceedings of ACM Sigmetrics, 2003.
-
-
-
-
4
-
-
4544250297
-
-
G. Badishi, I. Keidar, A. Sasson, Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast, in: Proceedings of Dependable Systems and Networks (DSN), 2004.
-
-
-
-
5
-
-
33846588517
-
-
D. Balenson, D. McGrew, A. Sherman, Key management for large dynamic groups: one-way function trees and amortized initialization, IETF Internet Draft (in preparation), August 2000.
-
-
-
-
6
-
-
33846622947
-
-
CCITT Recommendation X.509: The Directory-Authentication Framework, 1988.
-
-
-
-
7
-
-
33846578370
-
-
Y. Chu, S. Rao, S. Seshan, H. Zhang, Enabling conferencing applications on the internet using an overlay multicast architecture, in: Proceedings of ACM SIGCOMM, 2001.
-
-
-
-
8
-
-
33846616483
-
-
Y. Chu, S. Rao, H. Zhang, A case for endsystem multicast, in: Proceedings of ACM Sigmetrics'00, 2000.
-
-
-
-
9
-
-
33846621626
-
-
.
-
-
-
-
10
-
-
33846618348
-
-
S. Deering, Multicast routing in internetworks and extended LANs, Computer Communication Review 18(4), 1988. ACM SIGCOMM '88 Symposium: Communications Architectures and Protocols.
-
-
-
-
11
-
-
0033880792
-
Deployment issues for the IP multicast service and architecture
-
Diot C., Levine B., Lyles B., Kassem H., and Balensiefe D. Deployment issues for the IP multicast service and architecture. IEEE Network 14 (2000) 88-98
-
(2000)
IEEE Network
, vol.14
, pp. 88-98
-
-
Diot, C.1
Levine, B.2
Lyles, B.3
Kassem, H.4
Balensiefe, D.5
-
13
-
-
85019224720
-
-
B. Ford, P. Srisuresh, D. Kegel, Peer-to-peer communication across network address translators, in: Proceedings of USENIX Annual Technical Conference, 2005.
-
-
-
-
14
-
-
33846571517
-
-
H. He, T. Hardjono, B. Cain, Simple Multicast Receiver Access Control, draft-irtf-gsec-smrac-00.txt, November 2001.
-
-
-
-
15
-
-
33846608333
-
-
Internet Group Management Protocol, Version 3. .
-
-
-
-
16
-
-
85084100225
-
-
J. Jannotti, D. Gifford, K. Johnson, M. Kaashoek, J.O'Toole, Overcast: reliable, multicasting with an overlay network, in: Proceedings of Fourth USENIX OSDI Symposium, 2000.
-
-
-
-
17
-
-
3543050471
-
-
D. Liu, P. Ning, K. Sun, Efficient self-healing group key distribution with revocation capability, in: Proceedings of the 10th ACM CCS, 2003.
-
-
-
-
19
-
-
8344263066
-
-
L. Mathy, N. Blundell, V. Roca, A. Elsayed, Impact of simple cheating in application-level multicast, in: Proceedings of IEEE Infocom, 2004.
-
-
-
-
20
-
-
84880852861
-
-
D. Naor, M. Naor, J. Lotspiech, Revocation and tracing schemes for stateless receivers, in: Advances in Cryptology-CRYPTO 2001. Springer-Verlag Inc., LNCS 2139, 2001, pp. 41-62.
-
-
-
-
21
-
-
0034838199
-
-
A. Perrig, D. Song, D. Tygar, ELK, a new protocol for efficient large-group key distribution, in: Proceedings of the IEEE Symposium on Security and Privacy 2001, Oakland, CA, May 2001.
-
-
-
-
22
-
-
0033690786
-
-
S. Setia, S. Koussih, S. Jajodia, E. Harder, Kronos: a scalable group rekeying approach for secure multicast, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
-
-
-
23
-
-
1542691227
-
-
S. Setia, S. Zhu, S. Jajodia, A comparative performance analysis of reliable group rekey transport protocols for secure multicast, Performance Evaluation 49(1/4) (2002) 21-41 (special issue), in: Proceedings of Performance 2002, Rome, Italy, September.
-
-
-
-
24
-
-
0036079991
-
-
D. Song, D. Zuckerman, J. Tygar, Expander graphs for digital stream authentication and robust overlay networks, in: Proceedings of IEEE Symposium on Security and Privacy, 2002.
-
-
-
-
25
-
-
0032178082
-
-
C. Wong, M. Gouda, S. Lam, Secure group communication using key graphs, in: Proceedings of SIGCOMM, 1998, Vancouver, British, Columbia, pp. 68-79.
-
-
-
-
26
-
-
0034449903
-
-
R. Wright, P. Lincoln, J. Millen, Efficient fault-tolerant certificate revocation, in: Proceedings of ACM CCS, 2000.
-
-
-
-
27
-
-
4544239383
-
-
H. Yang, H. Luo, Y. Yang, S. Lu, L. Zhang, HOURS: achieving DoS resilence in an open service hierarchy, in: Proceedings of Dependable Systems and Networks (DSN), 2004.
-
-
-
-
28
-
-
33846621164
-
-
Y. Yang, X. Li, X. Zhang, S. Lam, Reliable group rekeying: design and performance analysis, in: Proceedings of ACM SIGCOMM, 2001.
-
-
-
-
29
-
-
0036343707
-
-
B. Zhang, S. Jamin, L. Zhang, Host Multicast: a framework for delivering multicast to end users, in: IEEE Infocom, 2002.
-
-
-
|