-
1
-
-
0033356116
-
A survey of security issues in multicast communications
-
Nov./Dec
-
M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Netw., vol. 13, no. 6, pp. 12-23, Nov./Dec. 1999.
-
(1999)
IEEE Netw
, vol.13
, Issue.6
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
2
-
-
0345565893
-
A survey of key management for secure group communication
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Comput. Surveys, vol. 35, no. 3, pp. 309-329, 2003.
-
(2003)
ACM Comput. Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
3
-
-
0003978251
-
Key Management for Multicast: Issues and Architectures
-
Internet Draft Rep, Online, Available: draft-wallner-key-arch-01.txt
-
D. M. Wallner, E. J. Harder, and R. C. Agee, "Key Management for Multicast: Issues and Architectures," Internet Draft Rep. 1998 [Online]. Available: draft-wallner-key-arch-01.txt.
-
(1998)
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
4
-
-
85010853294
-
The architecture and performance of security protocols in the ensemble group communication system
-
Aug
-
O. Rodeh, K. Birman, and D. Dolev, "The architecture and performance of security protocols in the ensemble group communication system," ACM Trans. Inf. Syst. Security, vol. 4, no. 3, pp. 289-319, Aug. 2001.
-
(2001)
ACM Trans. Inf. Syst. Security
, vol.4
, Issue.3
, pp. 289-319
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
5
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Netw
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
6
-
-
0031641387
-
Efficient security for large and dynamic multicast groups
-
Jun
-
G. Caronni, K. Waldvogel, D. Sun, and B. Plattner, "Efficient security for large and dynamic multicast groups," in Proc. 7th IEEE Int. Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises, Jun. 1998, pp. 376-383.
-
(1998)
Proc. 7th IEEE Int. Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises
, pp. 376-383
-
-
Caronni, G.1
Waldvogel, K.2
Sun, D.3
Plattner, B.4
-
7
-
-
0000636954
-
The VersaKey framework: Versatile group key management
-
Sep
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The VersaKey framework: Versatile group key management," IEEE J. Selected Areas Commun., vol. 17, pp. 1614-1631, Sep. 1999.
-
(1999)
IEEE J. Selected Areas Commun
, vol.17
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
8
-
-
0034849209
-
Key distribution for secure multimedia multicasts via data embedding
-
May
-
W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE ICASSP, May 2001, pp. 1449-1452.
-
(2001)
Proc. IEEE ICASSP
, pp. 1449-1452
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Liu, K.J.R.4
-
9
-
-
0003557429
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees TIS Labs at Network Associates, Inc., Glenwood, MD
-
Tech. Rep. 0755
-
D. McGrew and A. Sherman, Key Establishment in Large Dynamic Groups Using One-Way Function Trees TIS Labs at Network Associates, Inc., Glenwood, MD, Tech. Rep. 0755, 1998.
-
(1998)
-
-
McGrew, D.1
Sherman, A.2
-
10
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Mar
-
R. Canetti, J. Garay, G. Itkis, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proc. IEEE INFOCOM, Mar. 1999, vol. 2, pp. 708-716.
-
(1999)
Proc. IEEE INFOCOM
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Miccianancio, D.4
Naor, M.5
Pinkas, B.6
-
11
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in Proc. IEEE Symp. Security and Privacy, 2001, pp. 247-262.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, D.3
-
12
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug
-
G. H. Chiou and W. T. Chen, "Secure broadcasting using the secure lock," IEEE Trans. Softw. Eng., vol. 15, no. 8, pp. 929-934, Aug. 1989.
-
(1989)
IEEE Trans. Softw. Eng
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.H.1
Chen, W.T.2
-
13
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proc. ACM SIGCOMM, 1997, pp. 277-288.
-
(1997)
Proc. ACM SIGCOMM
, pp. 277-288
-
-
Mittra, S.1
-
14
-
-
0036800721
-
Scalable secure group communication over IP multicast
-
Oct
-
S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over IP multicast," IEEE J. Select. Areas Commun. Special Issue Network Support for Group Communication, vol. 20, no. 8, pp. 1511-1527, Oct. 2002.
-
(2002)
IEEE J. Select. Areas Commun. Special Issue Network Support for Group Communication
, vol.20
, Issue.8
, pp. 1511-1527
-
-
Banerjee, S.1
Bhattacharjee, B.2
-
15
-
-
0020180459
-
A conference key distribution system
-
Sep
-
I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. Inf. Theory, vol. IT-28, no. 5, pp. 714-720, Sep. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.IT-28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
16
-
-
84978523717
-
A secure audio teleconference system
-
New York: Springer-Verlag
-
D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A secure audio teleconference system," in Proc. Advances in Cryptology. New York: Springer-Verlag, 1990, pp. 520-528.
-
(1990)
Proc. Advances in Cryptology
, pp. 520-528
-
-
Steer, D.G.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
17
-
-
84948991087
-
A secure and efficient conference key distribution scheme
-
M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution scheme," Adv. Cryptology-Eurocrypt, pp. 275-286, 1994.
-
(1994)
Adv. Cryptology-Eurocrypt
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
18
-
-
0029720059
-
Diffie-hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-hellman key distribution extended to group communication," in Proc. 3rd ACM Conf. Computer and Communications Security, 1996, pp. 31-37.
-
(1996)
Proc. 3rd ACM Conf. Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
19
-
-
0031629148
-
CLIQUES: A new approach to group key agreement
-
May
-
M. Steiner, G. Tsudik, and M. Waidner, "CLIQUES: A new approach to group key agreement," in Proc. 18th Int. Conf. Distributed Computing Systems, May 1998, pp. 380-387.
-
(1998)
Proc. 18th Int. Conf. Distributed Computing Systems
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
20
-
-
0034247455
-
Key agreement in dynamic peer groups
-
Aug
-
M. Steiner, G. Tsudik, and M. Waidner, "Key agreement in dynamic peer groups," IEEE Trans. Parallel Distrib. Syst., vol. 11, no. 8, pp. 769-780, Aug. 2000.
-
(2000)
IEEE Trans. Parallel Distrib. Syst
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
22
-
-
0033689166
-
DISEC: A distributed framework for scalable secure many-to-many communication
-
L. R. Dondeti, S. Mukherjee, and A. Samal, "DISEC: A distributed framework for scalable secure many-to-many communication," in Proc. 5th IEEE Symp. Comput. Commun., 2000, pp. 693-698.
-
(2000)
Proc. 5th IEEE Symp. Comput. Commun
, pp. 693-698
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
23
-
-
0036283163
-
Establishment of conference keys in heterogeneous networks
-
W. Trappe, Y. Wang, and K. J. R. Liu, "Establishment of conference keys in heterogeneous networks," in Proc. IEEE Int. Conf. Communications, 2002, vol. 4, pp. 2201-2205.
-
(2002)
Proc. IEEE Int. Conf. Communications
, vol.4
, pp. 2201-2205
-
-
Trappe, W.1
Wang, Y.2
Liu, K.J.R.3
-
24
-
-
0003789153
-
Ip Multicast Applications: Challenges and Solutions
-
IETF Draft, Online, Available: draft-quinn-multicast- apps-00.txt
-
K. Almeroth and B. Quinn, "Ip Multicast Applications: Challenges and Solutions," IETF Draft 1998 [Online]. Available: draft-quinn-multicast- apps-00.txt.
-
(1998)
-
-
Almeroth, K.1
Quinn, B.2
-
25
-
-
0034780938
-
Reliable group rekeying: A performance analysis
-
Aug
-
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: A performance analysis," in Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications, Aug. 2001, pp. 27-38.
-
(2001)
Proc. Conf. Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
26
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
Oakland, CA, May
-
S. Setia, S. Koussih, S. Jajodia, and E. Harder, "Kronos: A scalable group re-keying approach for secure multicast," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 2000, pp. 215-218.
-
(2000)
Proc. IEEE Symp. Security and Privacy
, pp. 215-218
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
27
-
-
34249295220
-
-
Available
-
[Online]. Available: http://ftp.cc.gatech.edu/people/kevin/release-data.
-
-
-
-
28
-
-
0344395626
-
Key management and distribution for secure multimedia multicast
-
Dec
-
W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol. 5, no. 4, pp. 544-557, Dec. 2003.
-
(2003)
IEEE Trans. Multimedia
, vol.5
, Issue.4
, pp. 544-557
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Liu, K.J.R.4
-
30
-
-
0029749268
-
Collecting and modeling the join/leave behavior of multicast group members in the mbone
-
Syracuse, NY
-
K. Almeroth and M. Ammar, "Collecting and modeling the join/leave behavior of multicast group members in the mbone," in Proc. High Performance Distributed Computing, Syracuse, NY, 1996, pp. 209-216.
-
(1996)
Proc. High Performance Distributed Computing
, pp. 209-216
-
-
Almeroth, K.1
Ammar, M.2
-
31
-
-
0242341057
-
Multicast group behavior in the internet's multicast backbone (MBone)
-
Jun
-
K. Almeroth and M. Ammar, "Multicast group behavior in the internet's multicast backbone (MBone)," IEEE Commun. Mag., vol. 35, no. 6, pp. 124-129, Jun. 1997.
-
(1997)
IEEE Commun. Mag
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.1
Ammar, M.2
-
32
-
-
0003956699
-
Secure group communication in asynchronous networks with failures: Integration and experiments
-
presented at the, Apr
-
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton, and G. Tsudik, "Secure group communication in asynchronous networks with failures: Integration and experiments," presented at the IEEE ICDCS, Apr. 2000.
-
(2000)
IEEE ICDCS
-
-
Amir, Y.1
Ateniese, G.2
Hasse, D.3
Kim, Y.4
Nita-Rotaru, C.5
Schlossnagle, T.6
Schultz, J.7
Stanton, J.8
Tsudik, G.9
-
33
-
-
0036285009
-
An efficient key management scheme for secure wireless multicast
-
Y. Sun, W. Trappe, and K. J. R. Liu, "An efficient key management scheme for secure wireless multicast," in Proc. IEEE Int. Conf. Communication, 2002, vol. 2, pp. 1236-1240.
-
(2002)
Proc. IEEE Int. Conf. Communication
, vol.2
, pp. 1236-1240
-
-
Sun, Y.1
Trappe, W.2
Liu, K.J.R.3
-
34
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE J. Selected Areas Commun., vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE J. Selected Areas Commun
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
36
-
-
0034437520
-
Supporting multicast deployment efforts: A survey of tools for multicast monitoring
-
K. Saraç and K. C. Almeroth, "Supporting multicast deployment efforts: A survey of tools for multicast monitoring," J. High Speed Netw., vol. 9, no. 3-4, pp. 191-211, 2000.
-
(2000)
J. High Speed Netw
, vol.9
, Issue.3-4
, pp. 191-211
-
-
Saraç, K.1
Almeroth, K.C.2
|