-
2
-
-
0242341057
-
Multicast group behaviour in the internet's multicast backbone (Mbone)
-
K. Almeroth and M. Ammar, "Multicast group behaviour in the internet's multicast backbone (Mbone)," IEEE communications Magazine, vol. 35, no. 6, pp. 124-129, 1997.
-
(1997)
IEEE communications Magazine
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.1
Ammar, M.2
-
3
-
-
0033896618
-
The evolution of multicast: From the MBone to inter-domain multicast to Internet2 de-ployment
-
Jan -Feb
-
K. Almeroth, "The evolution of multicast: From the MBone to inter-domain multicast to Internet2 de-ployment," IEEE Network, vol. 14, pp. 10-20, Jan.-Feb. 2000.
-
(2000)
IEEE Network
, vol.14
, pp. 10-20
-
-
Almeroth, K.1
-
5
-
-
34547787397
-
New multicast tech-nology 'Survey and Security Concerns'
-
J. P. Avognon and Z. T. Li, "New multicast tech-nology 'Survey and Security Concerns'," Information Technology Journal, vol. 3, no. 1, pp. 95-105, 2004.
-
(2004)
Information Technology Journal
, vol.3
, Issue.1
, pp. 95-105
-
-
Avognon, J.P.1
Li, Z.T.2
-
6
-
-
0004135561
-
-
Internet-Draft, draft-balenson-groupkeymgmt-oft-00.txt, Feb
-
D. Balenson, D. McGrew, and A. Sherman, Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initializa-tion, Internet-Draft, draft-balenson-groupkeymgmt-oft-00.txt, Feb. 1999.
-
(1999)
Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initializa-tion
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
7
-
-
0003466087
-
Scalable Multicast Key Distribution
-
A. Ballardie, Scalable Multicast Key Distribution, RFC 1949, May 1996.
-
(1996)
RFC 1949 May
-
-
Ballardie, A.1
-
9
-
-
17844376972
-
-
RFC 3547, Jul. 2003
-
M. Baugher, B. Weis, T. Hardjono, and H. Harney, The Group Domain of Interpretation, RFC 3547, Jul. 2003.
-
The Group Domain of Interpretation
-
-
Baugher, M.1
Weis, B.2
Hardjono, T.3
Harney, H.4
-
10
-
-
0003404858
-
-
Wiley & sons edition
-
G. Belch, S. Greiner, and K. S. Trivedi H. d. Meer, Queueing Networks and Markov Chains,Modeling and Performance Evaluation with Computer Science Applications, Wiley & sons edition, 1998.
-
(1998)
d. Meer, Queueing Networks and Markov Chains,Modeling and Performance Evaluation with Computer Science Applications
-
-
Belch, G.1
Greiner, S.2
Trivedi, K.S.H.3
-
12
-
-
0032661699
-
Multicast Security: A tax-onomy and efficient constructions
-
Mar
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A tax-onomy and efficient constructions," in IEEE INFO-COM, pp. 708-716, Mar. 1999.
-
(1999)
IEEE INFO-COM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
13
-
-
15744371024
-
SAKM: a scalable and adaptive key management approach for multicast communications
-
Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: a scalable and adaptive key management approach for multicast communications," ACM SIG-COMM Computer Communications Review, vol. 34, no. 2, pp. 55-70, 2004.
-
(2004)
ACM SIG-COMM Computer Communications Review
, vol.34
, Issue.2
, pp. 55-70
-
-
Challal, Y.1
Bettahar, H.2
Bouabdallah, A.3
-
14
-
-
0036802534
-
Distributed servers approach for large-scale secure multicast
-
Oct
-
K. C. Chan and S. H. G. Chan, "Distributed servers approach for large-scale secure multicast," The IEEE Journal On Selected Areas in Communications, vol. 20, no. 8, pp. 1500-1510, Oct. 2002.
-
(2002)
The IEEE Journal On Selected Areas in Communications
, vol.20
, Issue.8
, pp. 1500-1510
-
-
Chan, K.C.1
Chan, S.H.G.2
-
15
-
-
0030102105
-
Unreliable failure de-tectors for reliable distributed systems
-
Mar
-
T. D. Chandra, and S. Toueg, "Unreliable failure de-tectors for reliable distributed systems," Journal of the ACM, vol. 43, no. 2, pp. 225-267, Mar. 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.2
, pp. 225-267
-
-
Chandra, T.D.1
Toueg, S.2
-
16
-
-
0035728669
-
Secure group communications for wireless networks
-
June
-
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang, "Secure group communications for wireless networks", in MILCOM'01, pp. 113-117, June 2001.
-
(2001)
MILCOM'01
, pp. 113-117
-
-
DeCleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
Towsley, D.7
Vasudevan, S.8
Zhang, C.9
-
17
-
-
0017018484
-
New directions in cryptography
-
Nov. 1976
-
W. Diffie, and M.E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, pp. 644-654, Nov. 1976.
-
IEEE Transactions on Information Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
18
-
-
84874953903
-
Reliability in multicast services and proto-cols; A survey
-
Dec
-
C. Diot, "Reliability in multicast services and proto-cols; A survey," in Proceedings Conference LAN & MAN, pp. 295-313, Dec. 1994.
-
(1994)
Proceedings Conference LAN & MAN
, pp. 295-313
-
-
Diot, C.1
-
19
-
-
0033880792
-
Deployment issues for the IP multicast service and architecture
-
C. Diot, B. N. Levine, B. Lyles, H. Kassem, and D. Balensiefen, "Deployment issues for the IP multicast service and architecture," IEEE Network, vol. 14, no. 1, pp. 78-88, 2000.
-
(2000)
IEEE Network
, vol.14
, Issue.1
, pp. 78-88
-
-
Diot, C.1
Levine, B.N.2
Lyles, B.3
Kassem, H.4
Balensiefen, D.5
-
21
-
-
0033293428
-
Com-parison of hierarchical key distribution schemes
-
L. R. Dondeti, S. Mukherjee, and A. Samal, "Com-parison of hierarchical key distribution schemes," IEEE Globcom Global Internet Symposium, pp. 1774-1778, 1999.
-
(1999)
IEEE Globcom Global Internet Symposium
, pp. 1774-1778
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
22
-
-
1442285783
-
-
Technical Report, University of Nebraska-Lincoln
-
L. R. Dondeti, S. Mukherjee, and A. Samal, Survey and Comparison of Secure Group Communication Protocols, Technical Report, University of Nebraska-Lincoln, 1999.
-
(1999)
Survey and Comparison of Secure Group Communication Protocols
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
23
-
-
0034318740
-
Scal-able secure one-to-many group communication using dual encryption
-
Nov. 2000
-
L. R. Dondeti, S. Mukherjee, and A. Samal, "Scal-able secure one-to-many group communication using dual encryption," Computer Communications, vol. 23, no. 17, pp. 1681-1701, Nov. 2000.
-
Computer Communications
, vol.23
, Issue.17
, pp. 1681-1701
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
25
-
-
0003508568
-
-
Federal Information Processing Standards Publica-tion, FIPS PUB 46, Dec
-
Federal Information Processing Standards Publica-tion, Data Encryption Standard (DES), FIPS PUB 46, Dec. 1993.
-
(1993)
Data Encryption Standard (DES)
-
-
-
26
-
-
0347227352
-
-
Federal Information Processing Standards Publication, Digital Signature Standard (DSS), FIPS PUB 186-2, Jan
-
Federal Information Processing Standards Publica-tion, National Institute of Standards and Technol-ogy (NIST), Digital Signature Standard (DSS), FIPS PUB 186-2, Jan. 2000.
-
(2000)
National Institute of Standards and Technol-ogy (NIST)
-
-
-
27
-
-
0003508558
-
-
Federal Information Processing Standards Publica-tion, FIPS PUB 197, Nov
-
Federal Information Processing Standards Publica-tion, Advanced Encryption Standard (AES), FIPS PUB 197, Nov. 2001.
-
(2001)
Advanced Encryption Standard (AES)
-
-
-
28
-
-
32144436209
-
Intra-domain Group Key Management for Multicast Security
-
Sep
-
T. Hardjono, B. Cain, and I. Monga, Intra-domain Group Key Management for Multicast Security, IETF Internet draft, Sep. 2000.
-
(2000)
IETF Internet draft
-
-
Hardjono, T.1
Cain, B.2
Monga, I.3
-
31
-
-
0842289246
-
Mykil: A highly scal-able and efficient key distribution protocol for large group multicast
-
J. H. Huang and S. Mishra, "Mykil: A highly scal-able and efficient key distribution protocol for large group multicast," IEEE GLOBECOM, pp. 1476-1480, 2003.
-
(2003)
IEEE GLOBECOM
, pp. 1476-1480
-
-
Huang, J.H.1
Mishra, S.2
-
33
-
-
0020180459
-
A conference key distribution system
-
Sep
-
I. Ingemarson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Transactions on In-formation Theory, vol. 28, no. 5, pp. 714-720, Sep. 1982.
-
(1982)
IEEE Transactions on In-formation Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarson, I.1
Tang, D.2
Wong, C.3
-
34
-
-
0037250819
-
Security issues and so-lutions in multicast content distribution: A survey
-
Jan.-Feb
-
P. Judge and M. Ammar, "Security issues and so-lutions in multicast content distribution: A survey," IEEE Network, vol. 17, no. 1, pp. 30-36, Jan.-Feb. 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
35
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Nov. 2000
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in 7th ACM Conference on Computer and Communications Security, pp. 235-244, Nov. 2000.
-
7th ACM Conference on Computer and Communications Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
36
-
-
0038043478
-
Key establishe-ment in large dynamic groups using one-way function trees
-
May
-
D. A. McGrew, and A. T. Sherman, "Key establishe-ment in large dynamic groups using one-way function trees," IEEE Transactions On Software Engeneering, vol. 29, no. 5, pp. 444-458, May 2003.
-
(2003)
IEEE Transactions On Software Engeneering
, vol.29
, Issue.5
, pp. 444-458
-
-
McGrew, D.A.1
Sherman, A.T.2
-
37
-
-
0030609312
-
Iolus: A framework for scalable se-cure multicasting
-
S. Mittra, "Iolus: A framework for scalable se-cure multicasting," in ACM SIGCOMM, pp. 277-288, 1997.
-
(1997)
ACM SIGCOMM
, pp. 277-288
-
-
Mittra, S.1
-
40
-
-
20544463154
-
SIM-KM: Scal-able infrastructure for multicast key management
-
Nov
-
R. Mukherjee and J. W. Atwood, "SIM-KM: Scal-able infrastructure for multicast key management," in IEEE Local Computer Networks (LCN'04), pp. 335-342, Nov. 2004.
-
(2004)
IEEE Local Computer Networks (LCN'04)
, pp. 335-342
-
-
Mukherjee, R.1
Atwood, J.W.2
-
41
-
-
0005280428
-
Efficient collaborative key management protocols for secure autonomous group communica-tion
-
A. Perrig, "Efficient collaborative key management protocols for secure autonomous group communica-tion," in International Workshop on Cryptographic techniques and E-commerce, pp. 192-202, 1999.
-
(1999)
International Workshop on Cryptographic techniques and E-commerce
, pp. 192-202
-
-
Perrig, A.1
-
42
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
May
-
A. Perrig, D. Song, and J.D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in IEEE Security and Priavcy Symposium, pp. 247-262, May 2001.
-
(2001)
IEEE Security and Priavcy Symposium
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
43
-
-
0344133886
-
A scalable extension of group key management pro-tocol
-
Feb
-
R. Poovendram, S. Ahmed, S. Corson, and J. Baras, "A scalable extension of group key management pro-tocol," in 2nd Annual ATRIP Conference, pp. 187-191, Feb. 1998.
-
(1998)
2nd Annual ATRIP Conference
, pp. 187-191
-
-
Poovendram, R.1
Ahmed, S.2
Corson, S.3
Baras, J.4
-
46
-
-
0345565893
-
A survey of key man-agement for secure group communication
-
Sep
-
S. Rafaeli and D. Hutchison, "A survey of key man-agement for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
47
-
-
0003195066
-
The MD5 Message-Digest Algorithm
-
Apr
-
R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, Apr. 1992.
-
(1992)
RFC
, vol.1321
-
-
Rivest, R.1
-
48
-
-
0017930809
-
A method for obtaining digital signatures and public-key cyptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adelman,"A method for obtaining digital signatures and public-key cyptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
49
-
-
85180743150
-
Optimized group rekey for group communication systems
-
Feb
-
O. Rodeh, K. Birman, and D. Dolev, "Optimized group rekey for group communication systems," in Network and Distributed System Security, pp. 39-48, Feb. 2000.
-
(2000)
Network and Distributed System Security
, pp. 39-48
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
50
-
-
10644262193
-
A new approach to scalable and fault-tolerant group key management protocols
-
H. Seba, A. Bouabdallah, and N. Badache, "A new approach to scalable and fault-tolerant group key management protocols," Journal of High Speed Net-works, vol. 13, no. 4, pp. 283-296, 2004.
-
(2004)
Journal of High Speed Net-works
, vol.13
, Issue.4
, pp. 283-296
-
-
Seba, H.1
Bouabdallah, A.2
Badache, N.3
-
51
-
-
0033690786
-
Kro-nos: A scalable group re-keying approach for secure multicast
-
May
-
S. Setia, S. Koussih, S. Jajodia, and E. Harder, "Kro-nos: A scalable group re-keying approach for secure multicast," in IEEE Symposium on Security and Pri-vacy, pp. 215-228, May 2000.
-
(2000)
IEEE Symposium on Security and Pri-vacy
, pp. 215-228
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
52
-
-
0033204997
-
KHIP-A scalable protocol for secure multicast routing
-
Oct
-
C. Shields and J. J. Garcia-Luna-Aceves, "KHIP-A scalable protocol for secure multicast routing," ACM SIGCOMM Computer Communication Review, vol. 29, no. 4, pp. 53-64, Oct. 1999.
-
(1999)
ACM SIGCOMM Computer Communication Review
, vol.29
, Issue.4
, pp. 53-64
-
-
Shields, C.1
Garcia-Luna-Aceves, J.J.2
-
53
-
-
0035001560
-
A lower bound for multicast key distribution
-
J. Snoeyink, S. Suri, and G. Vorghese, "A lower bound for multicast key distribution," in IEEE IN-FOCOM'01, pp. 422-431, 2001.
-
(2001)
IEEE IN-FOCOM'01
, pp. 422-431
-
-
Snoeyink, J.1
Suri, S.2
Vorghese, G.3
-
54
-
-
0029720059
-
Diffie-Hellman key distribution extended to group commu-nication
-
Mar
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group commu-nication," in 3rd ACM Conference on Computer and Communications Security, pp. 31-37, Mar. 1996.
-
(1996)
3rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
55
-
-
0000636954
-
The versaKey framework: Versatile group key management
-
Aug
-
M.Waldvogel, G. Caronni, D. Sun, N.Weiler, and B. Plattner, "The versaKey framework: Versatile group key management," IEEE Journal on Selected Areas in Communications (Special Issues on Middleware), vol. 17, no. 8, pp. 1614-1631, Aug. 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications (Special Issues on Middleware)
, vol.17
, Issue.8
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
57
-
-
0032178082
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," in ACM SIGCOMM, pp. 68-79, 1998.
-
(1998)
ACM SIGCOMM
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
58
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
59
-
-
0034780938
-
Reliable Group Rekeying: A Performance Analysis
-
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, Reliable Group Rekeying: A Performance Analysis, in Proceedings of the 2001 conference on Applica-tions, technologies, architectures, and protocols for computer communications, pp. 27-38, 2001.
-
(2001)
Proceedings of the 2001 conference on Applica-tions, technologies, architectures, and protocols for computer communications
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
|