메뉴 건너뛰기




Volumn , Issue , 2010, Pages 186-193

Key management with host mobility in dynamic groups

Author keywords

Group communication; Key management; Mobility; Security

Indexed keywords

DYNAMIC ASPECTS; DYNAMIC GROUPS; GROUP COMMUNICATIONS; GROUP-BASED; HOST MOBILITY; INDUSTRY RESEARCH; KEY MANAGEMENT; KEY MANAGEMENT PROTOCOLS; KEY MATERIALS; MOBILE ENVIRONMENTS; MOBILITY; PROTOCOL SIMULATION; RE-KEYING; REKEYING COSTS; SECURE GROUP COMMUNICATIONS; SECURITY;

EID: 77958032694     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1854099.1854138     Document Type: Conference Paper
Times cited : (17)

References (24)
  • 1
    • 77958039339 scopus 로고    scopus 로고
    • RFC4046: Multicast security (MSEC) group key management architecture
    • April
    • M. Baugher, R. C. L. Dondeti, and F. Lindholm. RFC4046: Multicast Security (MSEC) Group Key Management Architecture. IETF RFC 4046, April 2005.
    • (2005) IETF RFC 4046
    • Baugher, M.1    Dondeti, R.C.L.2    Lindholm, F.3
  • 2
    • 32644441025 scopus 로고    scopus 로고
    • Scalable key management for secure multicast communication in the mobile environment
    • April
    • J. Cao, L. Liao, and G. Wang. Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), April 2006.
    • (2006) Pervasive and Mobile Computing , vol.2 , Issue.2
    • Cao, J.1    Liao, L.2    Wang, G.3
  • 4
    • 77958031807 scopus 로고    scopus 로고
    • RFC5186: Internet group management protocol version 3 (IGMPv3)/multicast listener discovery version 2 (MLDv2) and multicast routing protocol interaction
    • May
    • B. Haberman and J. Martin. RFC5186: Internet Group Management Protocol Version 3 (IGMPv3)/Multicast Listener Discovery Version 2 (MLDv2) and Multicast Routing Protocol Interaction. IETF RFC 5186, May 2008.
    • (2008) IETF RFC 5186
    • Haberman, B.1    Martin, J.2
  • 5
    • 32144436209 scopus 로고    scopus 로고
    • Intra-domain group key management for multicast security
    • September
    • T. Hardjono, B. Cain, and I. Monga. Intra-domain Group Key Management for Multicast Security. IETF Internet draft, September 2000.
    • (2000) IETF Internet Draft
    • Hardjono, T.1    Cain, B.2    Monga, I.3
  • 6
    • 0003285503 scopus 로고    scopus 로고
    • RFC2093: Group key management protocol (GKMP) architecture
    • July
    • H. Harney and C. Muckenhirn. RFC2093: Group Key Management Protocol (GKMP) Architecture. IETF RFC 2093, July 1997.
    • (1997) IETF RFC 2093
    • Harney, H.1    Muckenhirn, C.2
  • 8
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and solutions in multicast content distribution: A survey
    • January/February
    • P. Judge and M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network, 17(1):30-36, January/February 2003.
    • (2003) IEEE Network , vol.17 , Issue.1 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 9
    • 0038391332 scopus 로고    scopus 로고
    • Reduction in control overhead for a secure, scalable framework for mobile multicast
    • May
    • S. Kamat, S. Parimi, and D. P. Agrawal. Reduction in Control Overhead for a Secure, Scalable Framework for Mobile Multicast. IEEE International Conference on Communications, 1:98-103, May 2003.
    • (2003) IEEE International Conference on Communications , vol.1 , pp. 98-103
    • Kamat, S.1    Parimi, S.2    Agrawal, D.P.3
  • 10
    • 77958038496 scopus 로고    scopus 로고
    • RFC4868: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
    • May
    • S. Kelly and S. Frankel. RFC4868: Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec. IETF RFC 4868, May 2007.
    • (2007) IETF RFC 4868
    • Kelly, S.1    Frankel, S.2
  • 11
    • 52249114327 scopus 로고    scopus 로고
    • Host mobility protocol for secure group communication in wireless mobile environments
    • Washington, DC, USA. IEEE Computer Society
    • M. L. M. Kiah and K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. In FGCN '07: Proceedings of the Future Generation Communication and Networking, pages 100-107, Washington, DC, USA, 2007. IEEE Computer Society.
    • (2007) FGCN '07: Proceedings of the Future Generation Communication and Networking , pp. 100-107
    • Kiah, M.L.M.1    Martin, K.M.2
  • 12
    • 77958037888 scopus 로고    scopus 로고
    • Host mobility protocol for secure group communication in wireless mobile environments
    • January
    • M. L. M. Kiah and K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and its Applications, 2(1):39-52, January 2008.
    • (2008) International Journal of Security and Its Applications , vol.2 , Issue.1 , pp. 39-52
    • Kiah, M.L.M.1    Martin, K.M.2
  • 15
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • September
    • S. Rafaeli and D. Hutchison. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys, 35(3):309-329, September 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 18
    • 77958076385 scopus 로고    scopus 로고
    • RFC5110: Overview of the internet multicast routing architecture
    • January
    • P. Savola. RFC5110: Overview of the Internet Multicast Routing Architecture. IETF RFC 5110, January 2008.
    • (2008) IETF RFC 5110
    • Savola, P.1
  • 21
    • 0003978251 scopus 로고    scopus 로고
    • RFC2627: Key management for multicast : Ies and architecture
    • June
    • D. Wallner, E. Harder, and R. Agee. RFC2627: Key Management for Multicast : Issues and Architecture. IETF RFC 2627, June 1999.
    • (1999) IETF RFC 2627
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 23
    • 3943050736 scopus 로고    scopus 로고
    • A survey of application level multicast techniques
    • September
    • C. Yeo, B. Lee, and M. Er. A survey of application level multicast techniques. Computer Communications, 27(15):1547-1568, September 2004.
    • (2004) Computer Communications , vol.27 , Issue.15 , pp. 1547-1568
    • Yeo, C.1    Lee, B.2    Er, M.3
  • 24
    • 1642403770 scopus 로고    scopus 로고
    • Comparison of inter-area rekeying algorithms for secure wireless group communications
    • C. Zhang, B. DeCleene, J. Kurose, and D. Towsley. Comparison of inter-area rekeying algorithms for secure wireless group communications. Perform. Eval., 49(1-4):1-20, 2002.
    • (2002) Perform. Eval. , vol.49 , Issue.1-4 , pp. 1-20
    • Zhang, C.1    Decleene, B.2    Kurose, J.3    Towsley, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.