-
1
-
-
77958039339
-
RFC4046: Multicast security (MSEC) group key management architecture
-
April
-
M. Baugher, R. C. L. Dondeti, and F. Lindholm. RFC4046: Multicast Security (MSEC) Group Key Management Architecture. IETF RFC 4046, April 2005.
-
(2005)
IETF RFC 4046
-
-
Baugher, M.1
Dondeti, R.C.L.2
Lindholm, F.3
-
2
-
-
32644441025
-
Scalable key management for secure multicast communication in the mobile environment
-
April
-
J. Cao, L. Liao, and G. Wang. Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), April 2006.
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
-
-
Cao, J.1
Liao, L.2
Wang, G.3
-
3
-
-
77953145198
-
Adaptive clustering for scalable key management in dynamic group communications
-
Y. Challal, S. Gharout, A. Bouabdallah, and H. Bettahar. Adaptive clustering for Scalable Key Management in Dynamic Group Communications. Inderscience International Journal of Security and Networks (IJSN), 3(2), 2008.
-
(2008)
Inderscience International Journal of Security and Networks (IJSN)
, vol.3
, Issue.2
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
4
-
-
77958031807
-
RFC5186: Internet group management protocol version 3 (IGMPv3)/multicast listener discovery version 2 (MLDv2) and multicast routing protocol interaction
-
May
-
B. Haberman and J. Martin. RFC5186: Internet Group Management Protocol Version 3 (IGMPv3)/Multicast Listener Discovery Version 2 (MLDv2) and Multicast Routing Protocol Interaction. IETF RFC 5186, May 2008.
-
(2008)
IETF RFC 5186
-
-
Haberman, B.1
Martin, J.2
-
5
-
-
32144436209
-
Intra-domain group key management for multicast security
-
September
-
T. Hardjono, B. Cain, and I. Monga. Intra-domain Group Key Management for Multicast Security. IETF Internet draft, September 2000.
-
(2000)
IETF Internet Draft
-
-
Hardjono, T.1
Cain, B.2
Monga, I.3
-
6
-
-
0003285503
-
RFC2093: Group key management protocol (GKMP) architecture
-
July
-
H. Harney and C. Muckenhirn. RFC2093: Group Key Management Protocol (GKMP) Architecture. IETF RFC 2093, July 1997.
-
(1997)
IETF RFC 2093
-
-
Harney, H.1
Muckenhirn, C.2
-
7
-
-
33749393987
-
GKM over large MANET
-
J. Hernandez-Serrano, J. Pegueroles, and M. Soriano. GKM over large MANET. Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), 2005.
-
(2005)
Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05)
-
-
Hernandez-Serrano, J.1
Pegueroles, J.2
Soriano, M.3
-
8
-
-
0037250819
-
Security issues and solutions in multicast content distribution: A survey
-
January/February
-
P. Judge and M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network, 17(1):30-36, January/February 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
9
-
-
0038391332
-
Reduction in control overhead for a secure, scalable framework for mobile multicast
-
May
-
S. Kamat, S. Parimi, and D. P. Agrawal. Reduction in Control Overhead for a Secure, Scalable Framework for Mobile Multicast. IEEE International Conference on Communications, 1:98-103, May 2003.
-
(2003)
IEEE International Conference on Communications
, vol.1
, pp. 98-103
-
-
Kamat, S.1
Parimi, S.2
Agrawal, D.P.3
-
10
-
-
77958038496
-
RFC4868: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
-
May
-
S. Kelly and S. Frankel. RFC4868: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. IETF RFC 4868, May 2007.
-
(2007)
IETF RFC 4868
-
-
Kelly, S.1
Frankel, S.2
-
11
-
-
52249114327
-
Host mobility protocol for secure group communication in wireless mobile environments
-
Washington, DC, USA. IEEE Computer Society
-
M. L. M. Kiah and K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. In FGCN '07: Proceedings of the Future Generation Communication and Networking, pages 100-107, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
FGCN '07: Proceedings of the Future Generation Communication and Networking
, pp. 100-107
-
-
Kiah, M.L.M.1
Martin, K.M.2
-
12
-
-
77958037888
-
Host mobility protocol for secure group communication in wireless mobile environments
-
January
-
M. L. M. Kiah and K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and its Applications, 2(1):39-52, January 2008.
-
(2008)
International Journal of Security and Its Applications
, vol.2
, Issue.1
, pp. 39-52
-
-
Kiah, M.L.M.1
Martin, K.M.2
-
13
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
New York, NY, USA. ACM Press
-
S. Mittra. Iolus: a framework for scalable secure multicasting. In SIGCOMM '97: Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, pages 277 - 288, New York, NY, USA, 1997. ACM Press.
-
(1997)
SIGCOMM '97: Proceedings of the ACM SIGCOMM '97 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 277-288
-
-
Mittra, S.1
-
14
-
-
0141538021
-
Efficient and secure keys management for wireless mobile communications
-
New York, NY, USA. ACM
-
R. D. Pietro, L. V. Mancini, and S. Jajodia. Efficient and secure keys management for wireless mobile communications. In POMC '02: Proceedings of the second ACM international workshop on Principles of mobile computing, pages 66-73, New York, NY, USA, 2002. ACM.
-
(2002)
POMC '02: Proceedings of the Second ACM International Workshop on Principles of Mobile Computing
, pp. 66-73
-
-
Pietro, R.D.1
Mancini, L.V.2
Jajodia, S.3
-
15
-
-
0345565893
-
A survey of key management for secure group communication
-
September
-
S. Rafaeli and D. Hutchison. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys, 35(3):309-329, September 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
17
-
-
26444509370
-
IP Mobile multicast: Challenges and solutions
-
I. Romdhani, M. Kellil, H.-Y. Lach, A. Bouabdallah, and H. Bettahar. IP Mobile Multicast: Challenges and Solutions. IEEE Communications Surveys & Tutorials, 6(1), 2004.
-
(2004)
IEEE Communications Surveys & Tutorials
, vol.6
, Issue.1
-
-
Romdhani, I.1
Kellil, M.2
Lach, H.-Y.3
Bouabdallah, A.4
Bettahar, H.5
-
18
-
-
77958076385
-
RFC5110: Overview of the internet multicast routing architecture
-
January
-
P. Savola. RFC5110: Overview of the Internet Multicast Routing Architecture. IETF RFC 5110, January 2008.
-
(2008)
IETF RFC 5110
-
-
Savola, P.1
-
19
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
May
-
S. Setia, S. Koussih, S. Jajodia, and E. Harder. Kronos: A scalable group re-keying approach for secure multicast. Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000., pages 215 - 228, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000. S&P 2000
, pp. 215-228
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
21
-
-
0003978251
-
RFC2627: Key management for multicast : Ies and architecture
-
June
-
D. Wallner, E. Harder, and R. Agee. RFC2627: Key Management for Multicast : Issues and Architecture. IETF RFC 2627, June 1999.
-
(1999)
IETF RFC 2627
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
22
-
-
0033893174
-
Secure group communications using key graphs
-
February
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, February 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
23
-
-
3943050736
-
A survey of application level multicast techniques
-
September
-
C. Yeo, B. Lee, and M. Er. A survey of application level multicast techniques. Computer Communications, 27(15):1547-1568, September 2004.
-
(2004)
Computer Communications
, vol.27
, Issue.15
, pp. 1547-1568
-
-
Yeo, C.1
Lee, B.2
Er, M.3
-
24
-
-
1642403770
-
Comparison of inter-area rekeying algorithms for secure wireless group communications
-
C. Zhang, B. DeCleene, J. Kurose, and D. Towsley. Comparison of inter-area rekeying algorithms for secure wireless group communications. Perform. Eval., 49(1-4):1-20, 2002.
-
(2002)
Perform. Eval.
, vol.49
, Issue.1-4
, pp. 1-20
-
-
Zhang, C.1
Decleene, B.2
Kurose, J.3
Towsley, D.4
|