메뉴 건너뛰기




Volumn 2, Issue 2, 2007, Pages 213-226

Analysis and protection of dynamic membership information for group key distribution schemes

Author keywords

Communication system security; Privacy

Indexed keywords

ACCESS GROUP COMMUNICATIONS; COMMUNICATION SYSTEM SECURITY;

EID: 34249340846     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2007.897274     Document Type: Article
Times cited : (9)

References (36)
  • 1
    • 0033356116 scopus 로고    scopus 로고
    • A survey of security issues in multicast communications
    • Nov./Dec
    • M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Netw., vol. 13, no. 6, pp. 12-23, Nov./Dec. 1999.
    • (1999) IEEE Netw , vol.13 , Issue.6 , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 2
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Comput. Surveys, vol. 35, no. 3, pp. 309-329, 2003.
    • (2003) ACM Comput. Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 3
    • 0003978251 scopus 로고    scopus 로고
    • Key Management for Multicast: Issues and Architectures
    • Internet Draft Rep, Online, Available: draft-wallner-key-arch-01.txt
    • D. M. Wallner, E. J. Harder, and R. C. Agee, "Key Management for Multicast: Issues and Architectures," Internet Draft Rep. 1998 [Online]. Available: draft-wallner-key-arch-01.txt.
    • (1998)
    • Wallner, D.M.1    Harder, E.J.2    Agee, R.C.3
  • 4
    • 85010853294 scopus 로고    scopus 로고
    • The architecture and performance of security protocols in the ensemble group communication system
    • Aug
    • O. Rodeh, K. Birman, and D. Dolev, "The architecture and performance of security protocols in the ensemble group communication system," ACM Trans. Inf. Syst. Security, vol. 4, no. 3, pp. 289-319, Aug. 2001.
    • (2001) ACM Trans. Inf. Syst. Security , vol.4 , Issue.3 , pp. 289-319
    • Rodeh, O.1    Birman, K.2    Dolev, D.3
  • 5
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Trans. Netw , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.1    Gouda, M.2    Lam, S.3
  • 8
    • 0034849209 scopus 로고    scopus 로고
    • Key distribution for secure multimedia multicasts via data embedding
    • May
    • W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE ICASSP, May 2001, pp. 1449-1452.
    • (2001) Proc. IEEE ICASSP , pp. 1449-1452
    • Trappe, W.1    Song, J.2    Poovendran, R.3    Liu, K.J.R.4
  • 9
    • 0003557429 scopus 로고    scopus 로고
    • Key Establishment in Large Dynamic Groups Using One-Way Function Trees TIS Labs at Network Associates, Inc., Glenwood, MD
    • Tech. Rep. 0755
    • D. McGrew and A. Sherman, Key Establishment in Large Dynamic Groups Using One-Way Function Trees TIS Labs at Network Associates, Inc., Glenwood, MD, Tech. Rep. 0755, 1998.
    • (1998)
    • McGrew, D.1    Sherman, A.2
  • 11
  • 12
    • 0024715386 scopus 로고
    • Secure broadcasting using the secure lock
    • Aug
    • G. H. Chiou and W. T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Softw. Eng., vol. 15, no. 8, pp. 929-934, Aug. 1989.
    • (1989) IEEE Trans. Softw. Eng , vol.15 , Issue.8 , pp. 929-934
    • Chiou, G.H.1    Chen, W.T.2
  • 13
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proc. ACM SIGCOMM, 1997, pp. 277-288.
    • (1997) Proc. ACM SIGCOMM , pp. 277-288
    • Mittra, S.1
  • 15
    • 0020180459 scopus 로고
    • A conference key distribution system
    • Sep
    • I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. Inf. Theory, vol. IT-28, no. 5, pp. 714-720, Sep. 1982.
    • (1982) IEEE Trans. Inf. Theory , vol.IT-28 , Issue.5 , pp. 714-720
    • Ingemarsson, I.1    Tang, D.2    Wong, C.3
  • 17
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution scheme
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution scheme," Adv. Cryptology-Eurocrypt, pp. 275-286, 1994.
    • (1994) Adv. Cryptology-Eurocrypt , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 22
    • 0033689166 scopus 로고    scopus 로고
    • DISEC: A distributed framework for scalable secure many-to-many communication
    • L. R. Dondeti, S. Mukherjee, and A. Samal, "DISEC: A distributed framework for scalable secure many-to-many communication," in Proc. 5th IEEE Symp. Comput. Commun., 2000, pp. 693-698.
    • (2000) Proc. 5th IEEE Symp. Comput. Commun , pp. 693-698
    • Dondeti, L.R.1    Mukherjee, S.2    Samal, A.3
  • 23
    • 0036283163 scopus 로고    scopus 로고
    • Establishment of conference keys in heterogeneous networks
    • W. Trappe, Y. Wang, and K. J. R. Liu, "Establishment of conference keys in heterogeneous networks," in Proc. IEEE Int. Conf. Communications, 2002, vol. 4, pp. 2201-2205.
    • (2002) Proc. IEEE Int. Conf. Communications , vol.4 , pp. 2201-2205
    • Trappe, W.1    Wang, Y.2    Liu, K.J.R.3
  • 24
    • 0003789153 scopus 로고    scopus 로고
    • Ip Multicast Applications: Challenges and Solutions
    • IETF Draft, Online, Available: draft-quinn-multicast- apps-00.txt
    • K. Almeroth and B. Quinn, "Ip Multicast Applications: Challenges and Solutions," IETF Draft 1998 [Online]. Available: draft-quinn-multicast- apps-00.txt.
    • (1998)
    • Almeroth, K.1    Quinn, B.2
  • 26
  • 27
    • 34249295220 scopus 로고    scopus 로고
    • Available
    • [Online]. Available: http://ftp.cc.gatech.edu/people/kevin/release-data.
  • 28
    • 0344395626 scopus 로고    scopus 로고
    • Key management and distribution for secure multimedia multicast
    • Dec
    • W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol. 5, no. 4, pp. 544-557, Dec. 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.4 , pp. 544-557
    • Trappe, W.1    Song, J.2    Poovendran, R.3    Liu, K.J.R.4
  • 30
    • 0029749268 scopus 로고    scopus 로고
    • Collecting and modeling the join/leave behavior of multicast group members in the mbone
    • Syracuse, NY
    • K. Almeroth and M. Ammar, "Collecting and modeling the join/leave behavior of multicast group members in the mbone," in Proc. High Performance Distributed Computing, Syracuse, NY, 1996, pp. 209-216.
    • (1996) Proc. High Performance Distributed Computing , pp. 209-216
    • Almeroth, K.1    Ammar, M.2
  • 31
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the internet's multicast backbone (MBone)
    • Jun
    • K. Almeroth and M. Ammar, "Multicast group behavior in the internet's multicast backbone (MBone)," IEEE Commun. Mag., vol. 35, no. 6, pp. 124-129, Jun. 1997.
    • (1997) IEEE Commun. Mag , vol.35 , Issue.6 , pp. 124-129
    • Almeroth, K.1    Ammar, M.2
  • 33
    • 0036285009 scopus 로고    scopus 로고
    • An efficient key management scheme for secure wireless multicast
    • Y. Sun, W. Trappe, and K. J. R. Liu, "An efficient key management scheme for secure wireless multicast," in Proc. IEEE Int. Conf. Communication, 2002, vol. 2, pp. 1236-1240.
    • (2002) Proc. IEEE Int. Conf. Communication , vol.2 , pp. 1236-1240
    • Sun, Y.1    Trappe, W.2    Liu, K.J.R.3
  • 34
  • 36
    • 0034437520 scopus 로고    scopus 로고
    • Supporting multicast deployment efforts: A survey of tools for multicast monitoring
    • K. Saraç and K. C. Almeroth, "Supporting multicast deployment efforts: A survey of tools for multicast monitoring," J. High Speed Netw., vol. 9, no. 3-4, pp. 191-211, 2000.
    • (2000) J. High Speed Netw , vol.9 , Issue.3-4 , pp. 191-211
    • Saraç, K.1    Almeroth, K.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.