메뉴 건너뛰기




Volumn 6, Issue 1, 2008, Pages 15-25

A peer-based recovery scheme for group rekeying in secure multicast

Author keywords

Rekey; Reliability; Secure multicast

Indexed keywords

BANDWIDTH RESOURCE; BEST-EFFORT SERVICES; DISTRIBUTED SCHEMES; EXTRA COMPUTATIONS; LOGICAL KEY HIERARCHY; OPERATING REGIMES; REKEY; SECURE MULTICASTS;

EID: 80054085558     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (17)
  • 6
    • 33746574489 scopus 로고    scopus 로고
    • The Multicast Group Security Architecture
    • RFC 3740, Mar.
    • T. Hardjono and B. Weis, The Multicast Group Security Architecture, IETF, RFC 3740, Mar. 2004.
    • (2004) IETF
    • Hardjono, T.1    Weis, B.2
  • 9
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and tracing schemes for stateless receivers
    • LNCS 2139
    • D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology - CRYPTO'01, LNCS 2139, pp. 41-62, 2001.
    • (2001) Advances in Cryptology - CRYPTO'01 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 10
    • 0036346553 scopus 로고    scopus 로고
    • Predicting internet network distance with coordinates-based approaches
    • T. S. E. Ng and H. Zhang, "Predicting internet network distance with coordinates-based approaches," in Proceedings of IEEE InfoCom'02, pp. 170-179, 2002.
    • (2002) Proceedings of IEEE InfoCom'02 , pp. 170-179
    • Ng, T.S.E.1    Zhang, H.2
  • 11
    • 0041472446 scopus 로고    scopus 로고
    • Big-bang simulation for embedding network distances in euclidean space
    • Apr.
    • Y. Shavitt and T. Tankel, "Big-bang simulation for embedding network distances in euclidean space," in Proceedings of IEEE InfoCom'03, Apr. 2003.
    • (2003) Proceedings of IEEE InfoCom'03
    • Shavitt, Y.1    Tankel, T.2
  • 12
    • 84874986305 scopus 로고    scopus 로고
    • VINT, The Network Simulator ns2.
    • VINT, The Network Simulator ns2. (http://www.isi.edu/nsnam/ns/)
  • 16
    • 1542715649 scopus 로고    scopus 로고
    • Group rekeying with limited unicast recovery
    • Apr.
    • X. Zhang, S. Lam, and D. Lee, "Group rekeying with limited unicast recovery," Computer Networks, vol. 44, no. 6, pp. 855-870, Apr. 2004.
    • (2004) Computer Networks , vol.44 , Issue.6 , pp. 855-870
    • Zhang, X.1    Lam, S.2    Lee, D.3
  • 17
    • 0347946946 scopus 로고    scopus 로고
    • Protocol design for scalable and reliable group rekeying
    • Dec.
    • X. Zhang, S. Lam, D. Lee, and Y. Yang, "Protocol design for scalable and reliable group rekeying," IEEE/ACM Transactions on Networking (TON), vol. 11, no. 6, pp. 908-922, Dec. 2003.
    • (2003) IEEE/ACM Transactions on Networking (TON) , vol.11 , Issue.6 , pp. 908-922
    • Zhang, X.1    Lam, S.2    Lee, D.3    Yang, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.