메뉴 건너뛰기




Volumn 2497, Issue , 2002, Pages 59-82

Network security in the multicast framework

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77955185252     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36162-6_3     Document Type: Conference Paper
Times cited : (2)

References (28)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. Lecture Notes in CS, 1109:1–15, 1996.
    • (1996) Lecture Notes in CS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 2
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • Alfredo De Santis, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume
    • M. V. D. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In Alfredo De Santis, editor, Advances in Cryptology - EuroCrypt’94, pages 275–286, Berlin, 1995. Springer-Verlag. Lecture Notes in Computer Science Volume 950.
    • (1995) Advances in Cryptology - EuroCrypt’94 , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 4
    • 0344908112 scopus 로고    scopus 로고
    • MARKS: Zero side-effect multicast key management using arbitrarily revealed key sequences
    • Bob Briscoe, November
    • Bob Briscoe. MARKS: Zero side-effect multicast key management using arbitrarily revealed key sequences. In First International Workshop on Networked Group Communication, November 1999.
    • (1999) First International Workshop on Networked Group Communication
  • 5
    • 0032627571 scopus 로고    scopus 로고
    • Key management for secure internet multicast using boolean function minimization techniques
    • March
    • Isabella Chang, Robert Engel, Dilip Kandlur, Dimitrios Pendarakis, and Debanjan Saha. Key management for secure internet multicast using boolean function minimization techniques. In Proceedings IEEE Infocomm’ 99, volume 2, pages 689–698, March 1999.
    • (1999) Proceedings IEEE Infocomm’ 99 , vol.2 , pp. 689-698
    • Chang, I.1    Engel, R.2    Kandlur, D.3    Pendarakis, D.4    Saha, D.5
  • 10
    • 0003545971 scopus 로고    scopus 로고
    • Request For Comments 2236, November, see also draft-ietf-idmr-igmpv3-androuting-01.txtforIGMPv3
    • W. Fenner. Internet group management protocol, version 2. Request For Comments 2236, November 1997. see also draft-ietf-idmr-igmpv3-androuting-01.txtforIGMPv3.
    • (1997) Internet Group Management Protocol, Version 2
    • Fenner, W.1
  • 12
    • 84979291225 scopus 로고
    • Broadcast encryption
    • Douglas R. Stinson, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume
    • A. Fiat and M. Naor. Broadcast encryption. In Douglas R. Stinson, editor, Advances in Cryptology - Crypto’93, pages 480–491, Berlin, 1993. Springer-Verlag. Lecture Notes in Computer Science Volume 773.
    • (1993) Advances in Cryptology - Crypto’93 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 15
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • September 14-18, Cannes, France
    • Suivo Mittra. Iolus: A framework for scalable secure multicasting. In Proceedings of the ACM SIGCOMM’97 (September 14-18, 1997, Cannes, France), 1997.
    • (1997) Proceedings of the ACM SIGCOMM’97
    • Mittra, S.1
  • 16
    • 0003352401 scopus 로고
    • Multicast extensions to OSPF
    • March
    • John Moy. Multicast extensions to OSPF. Request For Comment 1584, March 1994.
    • (1994) Request for Comment , pp. 1584
    • Moy, J.1
  • 19
    • 0003508558 scopus 로고    scopus 로고
    • National Institute of Standards and Technology
    • National Institute of Standards and Technology. Advanced Encryption Standard, 2001.
    • (2001) Advanced Encryption Standard
  • 20
    • 84957096234 scopus 로고    scopus 로고
    • An information theoretic analysis of rooted-tree based secure multicast key distribution schemes
    • R. Poovendran and John S. Baras. An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. In CRYPTO, pages 624–638, 1999.
    • (1999) CRYPTO , pp. 624-638
    • Poovendran, R.1    Baras, J.S.2
  • 22
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • B. Preneel, editor, of Lecture Notes in Computer Science, Springer Verlag
    • R.L. Rivest. The RC5 encryption algorithm. In In B. Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86–96. Springer Verlag, 1995.
    • (1995) Fast Software Encryption , vol.1008 , pp. 86-96
    • Rivest, R.L.1
  • 25
    • 84957905510 scopus 로고    scopus 로고
    • Northern District of California United States District Court. RIAA v
    • Northern District of California United States District Court. RIAA v. Napster, court’s 512(a) ruling, 1999.
    • (1999) Napster, court’s 512(A) Ruling
  • 26
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. In ACM SIGCOMM 1998, pages 68–79, 1998.
    • (1998) ACM SIGCOMM 1998 , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.