메뉴 건너뛰기




Volumn 51, Issue 12, 2007, Pages 3525-3548

Scalable solutions for secure group communications

Author keywords

Encryption; Key management; Multicast; Security

Indexed keywords

AUTHENTICATION; CRYPTOGRAPHY; INTERNET; MULTICASTING; MULTIMEDIA SERVICES; REAL TIME SYSTEMS;

EID: 34250309913     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2007.02.002     Document Type: Article
Times cited : (25)

References (34)
  • 1
    • 34250337897 scopus 로고    scopus 로고
    • D. Wallner, E. Harder, R. Agee, Key management for multicast: issues and architectures, RFC2627, June 1999.
  • 2
    • 34250302790 scopus 로고    scopus 로고
    • H. Harney, C. Muckenhirn, Group key management protocol (GKMP) architecture, RFC2094, July 1997.
  • 3
    • 34250314650 scopus 로고    scopus 로고
    • H. Harney, C. Muckenhirn, Group key management protocol (GKMP) specification, RFC2093, July 1997.
  • 4
    • 34250347432 scopus 로고    scopus 로고
    • A. Ballardie, Scalable multicast key distribution (SKMD), RFC1949, May 1996.
  • 5
    • 34250315437 scopus 로고    scopus 로고
    • S. Mittra, Iolus: a framework for scalable secure multicasting, in: ACM SIGCOMM, Cannes, France, September 1997.
  • 6
    • 34250306078 scopus 로고    scopus 로고
    • C.K. Wong, M. Gouda, S.S. Lam, Secure group communications using key graphs, in: ACM SIGCOMM, Vancouver, BC, September 1998.
  • 7
    • 34250356127 scopus 로고    scopus 로고
    • J. Huang, S. Mishra, Mykil: a highly scalable and efficient key distribution protocol for large group multicast, in: IEEE GLOBECOM, San Francisco, CA, December 2003.
  • 10
    • 20544463154 scopus 로고    scopus 로고
    • Ritesh Mukherjee, J. William Atwood, SIM-KM: scalable infrastructure for multicast key management, in: IEEE Conference on Local Computer Networks, Tampa, FL, November 2004.
  • 11
    • 20744441482 scopus 로고    scopus 로고
    • Ritesh Mukherjee, J. William Atwood, Proxy encryptions for secure multicast key management, in: IEEE Conference on Local Computer Networks, Bonn/Koenigswinter, Germany, October 2003.
  • 12
    • 34250302791 scopus 로고    scopus 로고
    • M. Blaze, G. Bleumer, M. Strauss, Divertible protocols and atomic proxy cryptography, Eurocrypt, Helsinki, Finland, 1998.
  • 13
    • 34250333536 scopus 로고    scopus 로고
    • Y. Dodis, A. Ivan, Proxy encryption revisited, in: Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2003.
  • 14
    • 34250309307 scopus 로고    scopus 로고
    • ITU-T Recommendation X.509 (2000){divides}ISO/IEC 9594-8:2001, Information technology - open systems interconnections - the directory: public-key and attribute certificate frameworks.
  • 17
    • 34250346204 scopus 로고    scopus 로고
    • B. Kaliski, J. Staddon, PKCS #1: RSA cryptography specifications version 2.0, RFC2437, 1998.
  • 18
    • 34250377015 scopus 로고    scopus 로고
    • R.D. Silverman, A cost-based security analysis of symmetric and asymmetric key lengths, Bulletin 13, RSA Laboratories, 2001.
  • 20
    • 0029780013 scopus 로고    scopus 로고
    • E.W. Zegura, K. Calvert, S. Bhattacharjee, How to model an Internetwork, in: IEEE INFOCOM, San Francisco, CA, 1996.
  • 21
    • 34250347834 scopus 로고    scopus 로고
    • K. Fall, K. Varadhan, The ns manual, http://www.isi.edu/nsnam/ns/doc/, August 2000.
  • 22
    • 34250354103 scopus 로고    scopus 로고
    • Ritesh Mukherjee, J. William Atwood, A comparative analysis of SIM-KM for group key management, in: IASTED International Conference on Communication and Computer Networks, Cambridge, MA, USA, November 2004.
  • 23
    • 34250337461 scopus 로고    scopus 로고
    • B. Fenner, M. Handley, H. Holbrook, I. Kouvelas, Protocol independent multicast - sparse mode (PIM-SM): protocol specification (revised), Internet Engineering Task Force, Request for Comments 4601, August 2006.
  • 25
    • 34250330084 scopus 로고    scopus 로고
    • R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, A taxonomy and some efficient constructions, in: IEEE INFOCOM, Kobe, Japan, March 1997.
  • 26
    • 34250338598 scopus 로고    scopus 로고
    • A. Perrig, J.D. Tygar, D. Song, R. Canetti, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, Berkeley, CA, May 2000.
  • 27
    • 34250343510 scopus 로고    scopus 로고
    • R. Gennaro, P. Rohatgi, How to sign digital streams, in: CRYPTO, Santa Barbara, CA, August 1997.
  • 28
    • 0035752112 scopus 로고    scopus 로고
    • A. Perrig, The BiBa one-time signature and broadcast authentication protocol, in: ACM Conference on Computer and Communications Security, Philadelphia, PA, November 2001.
  • 29
    • 0032313105 scopus 로고    scopus 로고
    • C.K. Wong, S.S. Lam, Digital signatures for flows and multicasts, in: International Conference on Network Protocols (ICNP), Austin, TX, October 1998.
  • 30
    • 34250362025 scopus 로고    scopus 로고
    • A. Pannetrat, R. Molva, Efficient multicast packet authentication, in: Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2003.
  • 31
    • 34250377607 scopus 로고    scopus 로고
    • P. Golle, N. Modadugu, Authenticating streamed data in the presence of random packet loss, in: Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2001.
  • 32
    • 34250367732 scopus 로고    scopus 로고
    • B. Weis, The use of RSA/SHA-1 signatures within ESP and AH, Internet Engineering Task Force, Request for Comments 4359, January 2006.
  • 33
    • 34250316292 scopus 로고    scopus 로고
    • Ritesh Mukherjee, J. William Atwood, Multicast group authentication, in: Proceedings of Network Control and Engineering for QoS, Security and Mobility (NETCON), Lannion, France, November 2005.
  • 34
    • 34250369740 scopus 로고    scopus 로고
    • E. Rescorla, B. Korver, Guidelines for writing RFC text on security considerations, RFC3552, July 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.