메뉴 건너뛰기




Volumn 7, Issue 2, 2008, Pages 160-174

Scalable delay-constrained multicast group key management

Author keywords

Dynamism; Key management; Multicat; Scala bility; Security

Indexed keywords

APPLICATION REQUIREMENTS; DYNAMISM; EFFICIENT COMMUNICATIONS; KEY MANAGEMENT; MULTICAST APPLICATION; MULTICAT; SECURITY; TRAFFIC ENCRYPTION KEYS;

EID: 80054073044     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (10)

References (60)
  • 2
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behaviour in the internet's multicast backbone (Mbone)
    • K. Almeroth and M. Ammar, "Multicast group behaviour in the internet's multicast backbone (Mbone)," IEEE communications Magazine, vol. 35, no. 6, pp. 124-129, 1997.
    • (1997) IEEE communications Magazine , vol.35 , Issue.6 , pp. 124-129
    • Almeroth, K.1    Ammar, M.2
  • 3
    • 0033896618 scopus 로고    scopus 로고
    • The evolution of multicast: From the MBone to inter-domain multicast to Internet2 de-ployment
    • Jan -Feb
    • K. Almeroth, "The evolution of multicast: From the MBone to inter-domain multicast to Internet2 de-ployment," IEEE Network, vol. 14, pp. 10-20, Jan.-Feb. 2000.
    • (2000) IEEE Network , vol.14 , pp. 10-20
    • Almeroth, K.1
  • 5
    • 34547787397 scopus 로고    scopus 로고
    • New multicast tech-nology 'Survey and Security Concerns'
    • J. P. Avognon and Z. T. Li, "New multicast tech-nology 'Survey and Security Concerns'," Information Technology Journal, vol. 3, no. 1, pp. 95-105, 2004.
    • (2004) Information Technology Journal , vol.3 , Issue.1 , pp. 95-105
    • Avognon, J.P.1    Li, Z.T.2
  • 7
    • 0003466087 scopus 로고    scopus 로고
    • Scalable Multicast Key Distribution
    • A. Ballardie, Scalable Multicast Key Distribution, RFC 1949, May 1996.
    • (1996) RFC 1949 May
    • Ballardie, A.1
  • 13
    • 15744371024 scopus 로고    scopus 로고
    • SAKM: a scalable and adaptive key management approach for multicast communications
    • Y. Challal, H. Bettahar, and A. Bouabdallah, "SAKM: a scalable and adaptive key management approach for multicast communications," ACM SIG-COMM Computer Communications Review, vol. 34, no. 2, pp. 55-70, 2004.
    • (2004) ACM SIG-COMM Computer Communications Review , vol.34 , Issue.2 , pp. 55-70
    • Challal, Y.1    Bettahar, H.2    Bouabdallah, A.3
  • 14
    • 0036802534 scopus 로고    scopus 로고
    • Distributed servers approach for large-scale secure multicast
    • Oct
    • K. C. Chan and S. H. G. Chan, "Distributed servers approach for large-scale secure multicast," The IEEE Journal On Selected Areas in Communications, vol. 20, no. 8, pp. 1500-1510, Oct. 2002.
    • (2002) The IEEE Journal On Selected Areas in Communications , vol.20 , Issue.8 , pp. 1500-1510
    • Chan, K.C.1    Chan, S.H.G.2
  • 15
    • 0030102105 scopus 로고    scopus 로고
    • Unreliable failure de-tectors for reliable distributed systems
    • Mar
    • T. D. Chandra, and S. Toueg, "Unreliable failure de-tectors for reliable distributed systems," Journal of the ACM, vol. 43, no. 2, pp. 225-267, Mar. 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.2 , pp. 225-267
    • Chandra, T.D.1    Toueg, S.2
  • 18
    • 84874953903 scopus 로고
    • Reliability in multicast services and proto-cols; A survey
    • Dec
    • C. Diot, "Reliability in multicast services and proto-cols; A survey," in Proceedings Conference LAN & MAN, pp. 295-313, Dec. 1994.
    • (1994) Proceedings Conference LAN & MAN , pp. 295-313
    • Diot, C.1
  • 19
    • 0033880792 scopus 로고    scopus 로고
    • Deployment issues for the IP multicast service and architecture
    • C. Diot, B. N. Levine, B. Lyles, H. Kassem, and D. Balensiefen, "Deployment issues for the IP multicast service and architecture," IEEE Network, vol. 14, no. 1, pp. 78-88, 2000.
    • (2000) IEEE Network , vol.14 , Issue.1 , pp. 78-88
    • Diot, C.1    Levine, B.N.2    Lyles, B.3    Kassem, H.4    Balensiefen, D.5
  • 23
    • 0034318740 scopus 로고    scopus 로고
    • Scal-able secure one-to-many group communication using dual encryption
    • Nov. 2000
    • L. R. Dondeti, S. Mukherjee, and A. Samal, "Scal-able secure one-to-many group communication using dual encryption," Computer Communications, vol. 23, no. 17, pp. 1681-1701, Nov. 2000.
    • Computer Communications , vol.23 , Issue.17 , pp. 1681-1701
    • Dondeti, L.R.1    Mukherjee, S.2    Samal, A.3
  • 25
    • 0003508568 scopus 로고
    • Federal Information Processing Standards Publica-tion, FIPS PUB 46, Dec
    • Federal Information Processing Standards Publica-tion, Data Encryption Standard (DES), FIPS PUB 46, Dec. 1993.
    • (1993) Data Encryption Standard (DES)
  • 26
    • 0347227352 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication, Digital Signature Standard (DSS), FIPS PUB 186-2, Jan
    • Federal Information Processing Standards Publica-tion, National Institute of Standards and Technol-ogy (NIST), Digital Signature Standard (DSS), FIPS PUB 186-2, Jan. 2000.
    • (2000) National Institute of Standards and Technol-ogy (NIST)
  • 27
    • 0003508558 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publica-tion, FIPS PUB 197, Nov
    • Federal Information Processing Standards Publica-tion, Advanced Encryption Standard (AES), FIPS PUB 197, Nov. 2001.
    • (2001) Advanced Encryption Standard (AES)
  • 28
    • 32144436209 scopus 로고    scopus 로고
    • Intra-domain Group Key Management for Multicast Security
    • Sep
    • T. Hardjono, B. Cain, and I. Monga, Intra-domain Group Key Management for Multicast Security, IETF Internet draft, Sep. 2000.
    • (2000) IETF Internet draft
    • Hardjono, T.1    Cain, B.2    Monga, I.3
  • 31
    • 0842289246 scopus 로고    scopus 로고
    • Mykil: A highly scal-able and efficient key distribution protocol for large group multicast
    • J. H. Huang and S. Mishra, "Mykil: A highly scal-able and efficient key distribution protocol for large group multicast," IEEE GLOBECOM, pp. 1476-1480, 2003.
    • (2003) IEEE GLOBECOM , pp. 1476-1480
    • Huang, J.H.1    Mishra, S.2
  • 34
    • 0037250819 scopus 로고    scopus 로고
    • Security issues and so-lutions in multicast content distribution: A survey
    • Jan.-Feb
    • P. Judge and M. Ammar, "Security issues and so-lutions in multicast content distribution: A survey," IEEE Network, vol. 17, no. 1, pp. 30-36, Jan.-Feb. 2003.
    • (2003) IEEE Network , vol.17 , Issue.1 , pp. 30-36
    • Judge, P.1    Ammar, M.2
  • 36
    • 0038043478 scopus 로고    scopus 로고
    • Key establishe-ment in large dynamic groups using one-way function trees
    • May
    • D. A. McGrew, and A. T. Sherman, "Key establishe-ment in large dynamic groups using one-way function trees," IEEE Transactions On Software Engeneering, vol. 29, no. 5, pp. 444-458, May 2003.
    • (2003) IEEE Transactions On Software Engeneering , vol.29 , Issue.5 , pp. 444-458
    • McGrew, D.A.1    Sherman, A.T.2
  • 37
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable se-cure multicasting
    • S. Mittra, "Iolus: A framework for scalable se-cure multicasting," in ACM SIGCOMM, pp. 277-288, 1997.
    • (1997) ACM SIGCOMM , pp. 277-288
    • Mittra, S.1
  • 40
    • 20544463154 scopus 로고    scopus 로고
    • SIM-KM: Scal-able infrastructure for multicast key management
    • Nov
    • R. Mukherjee and J. W. Atwood, "SIM-KM: Scal-able infrastructure for multicast key management," in IEEE Local Computer Networks (LCN'04), pp. 335-342, Nov. 2004.
    • (2004) IEEE Local Computer Networks (LCN'04) , pp. 335-342
    • Mukherjee, R.1    Atwood, J.W.2
  • 41
    • 0005280428 scopus 로고    scopus 로고
    • Efficient collaborative key management protocols for secure autonomous group communica-tion
    • A. Perrig, "Efficient collaborative key management protocols for secure autonomous group communica-tion," in International Workshop on Cryptographic techniques and E-commerce, pp. 192-202, 1999.
    • (1999) International Workshop on Cryptographic techniques and E-commerce , pp. 192-202
    • Perrig, A.1
  • 42
    • 0034838199 scopus 로고    scopus 로고
    • ELK, a new protocol for efficient large-group key distribution
    • May
    • A. Perrig, D. Song, and J.D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in IEEE Security and Priavcy Symposium, pp. 247-262, May 2001.
    • (2001) IEEE Security and Priavcy Symposium , pp. 247-262
    • Perrig, A.1    Song, D.2    Tygar, J.D.3
  • 46
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key man-agement for secure group communication
    • Sep
    • S. Rafaeli and D. Hutchison, "A survey of key man-agement for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sep. 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 47
    • 0003195066 scopus 로고
    • The MD5 Message-Digest Algorithm
    • Apr
    • R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, Apr. 1992.
    • (1992) RFC , vol.1321
    • Rivest, R.1
  • 48
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cyptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adelman,"A method for obtaining digital signatures and public-key cyptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.M.3
  • 50
    • 10644262193 scopus 로고    scopus 로고
    • A new approach to scalable and fault-tolerant group key management protocols
    • H. Seba, A. Bouabdallah, and N. Badache, "A new approach to scalable and fault-tolerant group key management protocols," Journal of High Speed Net-works, vol. 13, no. 4, pp. 283-296, 2004.
    • (2004) Journal of High Speed Net-works , vol.13 , Issue.4 , pp. 283-296
    • Seba, H.1    Bouabdallah, A.2    Badache, N.3
  • 53
    • 0035001560 scopus 로고    scopus 로고
    • A lower bound for multicast key distribution
    • J. Snoeyink, S. Suri, and G. Vorghese, "A lower bound for multicast key distribution," in IEEE IN-FOCOM'01, pp. 422-431, 2001.
    • (2001) IEEE IN-FOCOM'01 , pp. 422-431
    • Snoeyink, J.1    Suri, S.2    Vorghese, G.3
  • 57
    • 0032178082 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," in ACM SIGCOMM, pp. 68-79, 1998.
    • (1998) ACM SIGCOMM , pp. 68-79
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3
  • 58
    • 0033893174 scopus 로고    scopus 로고
    • Secure group communications using key graphs
    • Feb
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
    • (2000) IEEE/ACM Transactions on Networking , vol.8 , Issue.1 , pp. 16-30
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.