메뉴 건너뛰기




Volumn 12, Issue 1, 2011, Pages 13-20

New real time multicast authentication protocol

Author keywords

Authentication; Multicast communication; Real time

Indexed keywords

AUTHENTICATION PROTOCOLS; BURROWS , ABADI AND NEEDHAM LOGIC; COMMUNICATION OVERHEADS; COMPUTATION OVERHEADS; CONTENT DISTRIBUTION; ERASURE CODES; MULTICAST COMMUNICATION; MULTICAST DATA; MULTICASTS; POLLUTION ATTACK; PUBLIC-KEY SIGNATURES; REAL-TIME; REPLAY ATTACK; SECURITY ISSUES; SPECIFIC NATURE; SYMMETRIC ENCRYPTION; SYMMETRIC KEY ENCRYPTION; TRANSPORT MECHANISM;

EID: 80054070102     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (20)
  • 1
  • 4
    • 58149197417 scopus 로고    scopus 로고
    • Bandwidth-conserving multicast VoIP teleconference system
    • T. K. Chua and D. C. Pheanis, "Bandwidth-conserving multicast VoIP teleconference system," International Journal of Network Security, vol. 7, no. 1, pp. 42-48, 2008.
    • (2008) International Journal of Network Security , vol.7 , Issue.1 , pp. 42-48
    • Chua, T.K.1    Pheanis, D.C.2
  • 5
    • 2342637990 scopus 로고    scopus 로고
    • The Rijndael block ci-pher: AES proposal
    • Ventura, California, Aug
    • J. Daemen and V. Rijmen, "The Rijndael block ci-pher: AES proposal," First Candidate Conference (AES1), pp. 343-348, Ventura, California, Aug. 1998.
    • (1998) First Candidate Conference (AES1) , pp. 343-348
    • Daemen, J.1    Rijmen, V.2
  • 10
    • 34250309913 scopus 로고    scopus 로고
    • Scalable solutions for secure group communications
    • Science Direct, Nov
    • R. Mukherjee and J. Atwood, "Scalable solutions for secure group communications," Computers and Se-curity, pp. 3525-3548, Science Direct, Nov. 2007.
    • (2007) Computers and Se-curity , pp. 3525-3548
    • Mukherjee, R.1    Atwood, J.2
  • 11
    • 0033690336 scopus 로고    scopus 로고
    • Effi-cient authentication and signing of multicast streams over lossy channels
    • IEEE Com-puter Society Press, USA, May
    • A. Perrig, R. Canetti, J. Tygar, and D. Song, "Effi-cient authentication and signing of multicast streams over lossy channels," Proceedings of IEEE Sympo-sium on Security and Privacy, pp. 56-73, IEEE Com-puter Society Press, USA, May 2000.
    • (2000) Proceedings of IEEE Sympo-sium on Security and Privacy , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, J.3    Song, D.4
  • 12
    • 0034838199 scopus 로고    scopus 로고
    • ELK, a new protocol for efficient large group key distribution
    • Oakland, California, USA, May
    • A. Perrig, D. Song, and J. Tygar, "ELK, a new protocol for efficient large group key distribution," Proceedings of IEEE Symposium on Security and Privacy, pp. 47-62, Oakland, California, USA, May 2001.
    • (2001) Proceedings of IEEE Symposium on Security and Privacy , pp. 47-62
    • Perrig, A.1    Song, D.2    Tygar, J.3
  • 17
    • 33744934228 scopus 로고    scopus 로고
    • Cryptography and Network Security
    • Third Edition, Prentice-Hall
    • W. Stallings, Cryptography and Network Security: Principals and Practices, Third Edition, Prentice-Hall, 2003.
    • (2003) Principals and Practices
    • Stallings, W.1
  • 18
    • 40049083567 scopus 로고    scopus 로고
    • Efficient key agreement for large and dynamic multicast groups
    • L. Wang and C. K. Wu, "Efficient key agreement for large and dynamic multicast groups," International Journal of Network Security, vol. 3, no. 1, pp. 8-17, 2006.
    • (2006) International Journal of Network Security , vol.3 , Issue.1 , pp. 8-17
    • Wang, L.1    Wu, C.K.2
  • 19
    • 0032594123 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • C. Wong and S. Lam, "Digital signatures for flows and multicasts," IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 502-513, 1999.
    • (1999) IEEE/ACM Transactions on Networking , vol.7 , Issue.4 , pp. 502-513
    • Wong, C.1    Lam, S.2
  • 20
    • 80054085558 scopus 로고    scopus 로고
    • A peer-based recovery scheme for group rekeying in secure multicast
    • Q. Zhang and K. L. Calvert, "A peer-based recovery scheme for group rekeying in secure multicast," International Journal of Network Security, vol. 6, no. 1, pp. 15-25, 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.1 , pp. 15-25
    • Zhang, Q.1    Calvert, K.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.