-
1
-
-
0003285503
-
Group key management protocol (GKMP) specification
-
July
-
H. Harney and C. Muckenhirn, "Group Key Management Protocol (GKMP) Specification", RFC 2093, July 1997.
-
(1997)
RFC
, vol.2093
-
-
Harney, H.1
Muckenhirn, C.2
-
2
-
-
0003259063
-
Key management for multicast: Issues and architectures
-
D. M. Wallner, E. J. Harder, and R. C. Agee, "Key Management for Multicast: Issues and Architectures", RFC 2627, 1999.
-
(1999)
RFC
, vol.2627
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
3
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications Using Key Graphs", IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
4
-
-
0242412970
-
Adaptive rekeying for secure multicast
-
special issue on comm., Oct
-
S. S. Kulkarni and B. Bruhadeshwar, "Adaptive Rekeying for Secure Multicast", IEEE/IEICE Trans. Comm., special issue on comm., vol. E86-B, no. 10, pp. 2948-2956, Oct. 2003.
-
(2003)
IEEE/IEICE Trans. Comm.
, vol.E86-B
, Issue.10
, pp. 2948-2956
-
-
Kulkarni, S.S.1
Bruhadeshwar, B.2
-
5
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
D. McGrew and A. Sherman, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees", IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Software Eng.
, vol.29
, Issue.5
, pp. 444-458
-
-
McGrew, D.1
Sherman, A.2
-
6
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting", Proc. ACM SIGCOMM'97, pp. 277-288, 1997.
-
(1997)
Proc. ACM SIGCOMM'97
, pp. 277-288
-
-
Mittra, S.1
-
7
-
-
0000636954
-
The versakey framework: Versatile group key management
-
Sept
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The Versakey Framework: Versatile Group Key Management", IEEE J. Selected Areas in Comm., vol. 17, no. 9, pp. 1614-1631, Sept. 1999.
-
(1999)
IEEE J. Selected Areas in Comm.
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
9
-
-
0029720059
-
Diffie-hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication", Proc. Third ACM Conf. Computer and Comm. Security (CCS'96), pp. 31-37, 1996.
-
(1996)
Proc. Third ACM Conf. Computer and Comm. Security (CCS'96)
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
11
-
-
3142512728
-
Tree-based group key agreement
-
Feb
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-Based Group Key Agreement", ACM Trans. Information and System Security, vol. 7, no. 1, pp. 60-96, Feb. 2004.
-
(2004)
ACM Trans. Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
13
-
-
0032627571
-
Key management for secure internet multicast using boolean function minimization techniques
-
Mar
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques", Proc. IEEE INFOCOMM'99, vol. 2, pp. 689-698, Mar. 1999.
-
(1999)
Proc. IEEE INFOCOMM'99
, vol.2
, pp. 689-698
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
14
-
-
0036929565
-
Secure multicast in wireless networks of mobile hosts: Protocols and issues
-
D. Bruschi and E. Rosti, "Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues", Mobile Networks and Applications, vol. 7, no. 6, pp. 503-511, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 503-511
-
-
Bruschi, D.1
Rosti, E.2
-
15
-
-
13244275074
-
Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks
-
S. Zhu, S. Setia, S. Xu, and S. Jajodia, "Gkmpan: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks", Proc. IEEE Mobiquitos'04, pp. 42-51, 2004.
-
(2004)
Proc. IEEE Mobiquitos'04
, pp. 42-51
-
-
Zhu, S.1
Setia, S.2
Xu, S.3
Jajodia, S.4
-
16
-
-
4644294648
-
A scalable multicast key management scheme for heterogeneous wireless networks
-
Aug
-
Y. Sun, W. Trappe, and K. J. R. Liu, "A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks", IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.4
, pp. 653-666
-
-
Sun, Y.1
Trappe, W.2
Liu, K.J.R.3
-
17
-
-
78649370805
-
Batch updates of key trees
-
May
-
X. S. Li, Y. R. Yang, M. Gouda, and S. S. Lam, "Batch Updates of Key Trees", Proc. 10th Int'l World Wide Web Conf. (WWW10), May 2001.
-
(2001)
Proc. 10th Int'l World Wide Web Conf. (WWW10)
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.3
Lam, S.S.4
-
18
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
S. Setia, S. Koushish, and S. Jajodia, "Kronos: A Scalable Group Re-Keying Approach for Secure Multicast", Proc. IEEE Symp. Security and Privacy, pp. 215-228, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
, pp. 215-228
-
-
Setia, S.1
Koushish, S.2
Jajodia, S.3
-
19
-
-
34147147912
-
Dynamic balanced key tree management for secure multicast communications
-
May
-
W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, "Dynamic Balanced Key Tree Management for Secure Multicast Communications", IEEE Trans. Computers, vol. 56, no. 5, pp. 577-589, May 2007.
-
(2007)
IEEE Trans. Computers
, vol.56
, Issue.5
, pp. 577-589
-
-
Ng, W.H.D.1
Howarth, M.2
Sun, Z.3
Cruickshank, H.4
-
20
-
-
3142723549
-
Optimal tree structure for key management of simultaneous join/leave in secure multicast
-
F. Zhu, A. Chan, and G. Noubir, "Optimal Tree Structure for Key Management of Simultaneous Join/Leave in Secure Multicast", Proc. Military Comm. Conf. (MILCOM), 2003.
-
(2003)
Proc. Military Comm. Conf. (MILCOM)
-
-
Zhu, F.1
Chan, A.2
Noubir, G.3
-
21
-
-
33749594702
-
Efficient algorithms for batch re-keying operations in secure multicast
-
M. H. Heydari, L. Morales, and I. H. Sudborough, "Efficient Algorithms for Batch Re-Keying Operations in Secure Multicast", Proc. 39th Ann. Hawaii Int'l Conf. System Sciences, vol. 9, 2006.
-
(2006)
Proc. 39th Ann. Hawaii Int'l Conf. System Sciences
, vol.9
-
-
Heydari, M.H.1
Morales, L.2
Sudborough, I.H.3
-
22
-
-
84989229534
-
Efficient revocation schemes for secure multicast
-
Dec
-
H. Kurnio, S. Rei, and H. Wang, "Efficient Revocation Schemes for Secure Multicast", Proc. Int'l Conf. Information Security and Cryptology'01, pp. 160-177, Dec. 2001.
-
(2001)
Proc. Int'l Conf. Information Security and Cryptology'01
, pp. 160-177
-
-
Kurnio, H.1
Rei, S.2
Wang, H.3
-
25
-
-
0035504627
-
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
-
Nov
-
R. Poovendran and J. S. Baras, "An Information-Theoretic Approach for Design and Analysis of Rooted-Tree-Based Multicast Key Management Schemes", IEEE Trans. Information Theory, vol. 47, no. 7, pp. 2824-2834, Nov. 2001.
-
(2001)
IEEE Trans. Information Theory
, vol.47
, Issue.7
, pp. 2824-2834
-
-
Poovendran, R.1
Baras, J.S.2
-
27
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
S. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences", Proc. Advances in Cryptology-CRYPTO'92, pp. 471-486, 1992.
-
(1992)
Proc. Advances in Cryptology-CRYPTO'92
, pp. 471-486
-
-
Blundo, S.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
28
-
-
55349146952
-
Skipping, cascade, and combined chain schemes for broadcast encryption
-
Nov
-
J. H. Cheon, N. Jho, M. Kim, and E. Yoo, "Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption", IEEE Trans. Information Theory, vol. 54, no. 11, pp. 5155-5171, Nov. 2008.
-
(2008)
IEEE Trans. Information Theory
, vol.54
, Issue.11
, pp. 5155-5171
-
-
Cheon, J.H.1
Jho, N.2
Kim, M.3
Yoo, E.4
-
29
-
-
0036801441
-
A case for end system multicast
-
Oct
-
Y.-H. Chu, S. G. Rao, S. Seshan, and H. Zhang, "A Case for End System Multicast", IEEE J. Selected Areas in Comm., vol. 20, no. 8, pp. 1456-1471, Oct. 2002.
-
(2002)
IEEE J. Selected Areas in Comm.
, vol.20
, Issue.8
, pp. 1456-1471
-
-
Chu, Y.-H.1
Rao, S.G.2
Seshan, S.3
Zhang, H.4
-
30
-
-
76349090283
-
Host multicast: A framework for delivering multicast to end users
-
Mar
-
B. Zhang, S. Jamin, and L. Zhang, "Host Multicast: A Framework for Delivering Multicast to End Users", Proc. IEEE INFOCOM, Mar. 2000.
-
(2000)
Proc. IEEE INFOCOM
-
-
Zhang, B.1
Jamin, S.2
Zhang, L.3
-
31
-
-
0036800741
-
Application-layer multicasting with delaunay triangulation overlays
-
Oct
-
J. Liebeherr, M. Nahas, and W. Si, "Application-Layer Multicasting with Delaunay Triangulation Overlays", IEEE J. Selected Areas in Comm., vol. 20, no. 8, pp. 1472-1488, Oct. 2002.
-
(2002)
IEEE J. Selected Areas in Comm.
, vol.20
, Issue.8
, pp. 1472-1488
-
-
Liebeherr, J.1
Nahas, M.2
Si, W.3
-
32
-
-
0035015898
-
Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
-
Apr
-
L. M. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment", Proc. IEEE INFOCOM, Apr. 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Feeney, L.M.1
Nilsson, M.2
|