-
1
-
-
34250337897
-
-
D. Wallner, E. Harder, R. Agee, Key management for multicast: issues and architectures, RFC2627, June 1999.
-
-
-
-
2
-
-
34250302790
-
-
H. Harney, C. Muckenhirn, Group key management protocol (GKMP) architecture, RFC2094, July 1997.
-
-
-
-
3
-
-
34250314650
-
-
H. Harney, C. Muckenhirn, Group key management protocol (GKMP) specification, RFC2093, July 1997.
-
-
-
-
4
-
-
34250347432
-
-
A. Ballardie, Scalable multicast key distribution (SKMD), RFC1949, May 1996.
-
-
-
-
5
-
-
34250315437
-
-
S. Mittra, Iolus: a framework for scalable secure multicasting, in: ACM SIGCOMM, Cannes, France, September 1997.
-
-
-
-
6
-
-
34250306078
-
-
C.K. Wong, M. Gouda, S.S. Lam, Secure group communications using key graphs, in: ACM SIGCOMM, Vancouver, BC, September 1998.
-
-
-
-
7
-
-
34250356127
-
-
J. Huang, S. Mishra, Mykil: a highly scalable and efficient key distribution protocol for large group multicast, in: IEEE GLOBECOM, San Francisco, CA, December 2003.
-
-
-
-
10
-
-
20544463154
-
-
Ritesh Mukherjee, J. William Atwood, SIM-KM: scalable infrastructure for multicast key management, in: IEEE Conference on Local Computer Networks, Tampa, FL, November 2004.
-
-
-
-
11
-
-
20744441482
-
-
Ritesh Mukherjee, J. William Atwood, Proxy encryptions for secure multicast key management, in: IEEE Conference on Local Computer Networks, Bonn/Koenigswinter, Germany, October 2003.
-
-
-
-
12
-
-
34250302791
-
-
M. Blaze, G. Bleumer, M. Strauss, Divertible protocols and atomic proxy cryptography, Eurocrypt, Helsinki, Finland, 1998.
-
-
-
-
13
-
-
34250333536
-
-
Y. Dodis, A. Ivan, Proxy encryption revisited, in: Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2003.
-
-
-
-
14
-
-
34250309307
-
-
ITU-T Recommendation X.509 (2000){divides}ISO/IEC 9594-8:2001, Information technology - open systems interconnections - the directory: public-key and attribute certificate frameworks.
-
-
-
-
17
-
-
34250346204
-
-
B. Kaliski, J. Staddon, PKCS #1: RSA cryptography specifications version 2.0, RFC2437, 1998.
-
-
-
-
18
-
-
34250377015
-
-
R.D. Silverman, A cost-based security analysis of symmetric and asymmetric key lengths, Bulletin 13, RSA Laboratories, 2001.
-
-
-
-
20
-
-
0029780013
-
-
E.W. Zegura, K. Calvert, S. Bhattacharjee, How to model an Internetwork, in: IEEE INFOCOM, San Francisco, CA, 1996.
-
-
-
-
21
-
-
34250347834
-
-
K. Fall, K. Varadhan, The ns manual, http://www.isi.edu/nsnam/ns/doc/, August 2000.
-
-
-
-
22
-
-
34250354103
-
-
Ritesh Mukherjee, J. William Atwood, A comparative analysis of SIM-KM for group key management, in: IASTED International Conference on Communication and Computer Networks, Cambridge, MA, USA, November 2004.
-
-
-
-
23
-
-
34250337461
-
-
B. Fenner, M. Handley, H. Holbrook, I. Kouvelas, Protocol independent multicast - sparse mode (PIM-SM): protocol specification (revised), Internet Engineering Task Force, Request for Comments 4601, August 2006.
-
-
-
-
25
-
-
34250330084
-
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, A taxonomy and some efficient constructions, in: IEEE INFOCOM, Kobe, Japan, March 1997.
-
-
-
-
26
-
-
34250338598
-
-
A. Perrig, J.D. Tygar, D. Song, R. Canetti, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, Berkeley, CA, May 2000.
-
-
-
-
27
-
-
34250343510
-
-
R. Gennaro, P. Rohatgi, How to sign digital streams, in: CRYPTO, Santa Barbara, CA, August 1997.
-
-
-
-
28
-
-
0035752112
-
-
A. Perrig, The BiBa one-time signature and broadcast authentication protocol, in: ACM Conference on Computer and Communications Security, Philadelphia, PA, November 2001.
-
-
-
-
29
-
-
0032313105
-
-
C.K. Wong, S.S. Lam, Digital signatures for flows and multicasts, in: International Conference on Network Protocols (ICNP), Austin, TX, October 1998.
-
-
-
-
30
-
-
34250362025
-
-
A. Pannetrat, R. Molva, Efficient multicast packet authentication, in: Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2003.
-
-
-
-
31
-
-
34250377607
-
-
P. Golle, N. Modadugu, Authenticating streamed data in the presence of random packet loss, in: Network and Distributed System Security Symposium (NDSS), San Diego, CA, February 2001.
-
-
-
-
32
-
-
34250367732
-
-
B. Weis, The use of RSA/SHA-1 signatures within ESP and AH, Internet Engineering Task Force, Request for Comments 4359, January 2006.
-
-
-
-
33
-
-
34250316292
-
-
Ritesh Mukherjee, J. William Atwood, Multicast group authentication, in: Proceedings of Network Control and Engineering for QoS, Security and Mobility (NETCON), Lannion, France, November 2005.
-
-
-
-
34
-
-
34250369740
-
-
E. Rescorla, B. Korver, Guidelines for writing RFC text on security considerations, RFC3552, July 2003.
-
-
-
|