-
1
-
-
34247249787
-
-
Request for Comments, draftietf-msec-gkmarch-08.txt, Apr. 2005.
-
M. Baugher, R. Canetti, L. Dondeti, and F. Lindholm, Multicast Security (MSEC) Group Key Management Architecture, Request for Comments, draftietf-msec-gkmarch-08.txt, Apr. 2005.
-
Multicast Security (MSEC) Group Key Management Architecture
-
-
Baugher, M.1
Canetti, R.2
Dondeti, L.3
Lind-holm, F.4
-
2
-
-
0000178416
-
Modelling Internet topology
-
June
-
K. Calvert, M. Doar, and E. W. Zegura, "Modelling Internet topology," IEEE Communications Magazine, vol. 35, no. 6, pp. 160-163, June 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.6
, pp. 160-163
-
-
Calvert, K.1
Doar, M.2
Zegura, E.W.3
-
3
-
-
2442538245
-
PIC: Practical internet coordinates for distance estimation
-
Mar.
-
M. Costa, M. Castro, A. Rowstron, and P. Key, "PIC: Practical internet coordinates for distance estimation," in International Conference on Distributed Systems, Mar. 2004.
-
(2004)
International Conference on Distributed Systems
-
-
Costa, M.1
Castro, M.2
Rowstron, A.3
Key, P.4
-
5
-
-
85016876571
-
Multicast routing in internetworks and extended LANs
-
Stanford, California, ACM Press
-
S. E. Deering, "Multicast routing in internetworks and extended LANs," in Symposium proceedings on Communications Architectures and Protocols, pp. 55-64, Stanford, California, ACM Press, 1988.
-
(1988)
Symposium proceedings on Communications Architectures and Protocols
, pp. 55-64
-
-
Deering, S.E.1
-
6
-
-
33746574489
-
The Multicast Group Security Architecture
-
RFC 3740, Mar.
-
T. Hardjono and B. Weis, The Multicast Group Security Architecture, IETF, RFC 3740, Mar. 2004.
-
(2004)
IETF
-
-
Hardjono, T.1
Weis, B.2
-
7
-
-
19544368640
-
Constructing Internet coordinate system based on delay measurement
-
Oct.
-
H. Lim, J. Hou, and C. Choi, "Constructing Internet coordinate system based on delay measurement," in Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement, pp. 129-142, Oct. 2003.
-
(2003)
Proceedings of the 2003 ACM SIGCOMM conference on Internet measurement
, pp. 129-142
-
-
Lim, H.1
Hou, J.2
Choi, C.3
-
8
-
-
0003557429
-
-
TIS Labs at Network Associates, Inc, Technical Report, no. 0755, Glenwood, MD, may 1998.
-
D. A. McGrew and A. T. Sherman, Key Establishment in Large Dynamic Groups Using One-Way Function Trees, TIS Labs at Network Associates, Inc, Technical Report, no. 0755, Glenwood, MD, may 1998.
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
-
-
McGrew, D.A.1
Sherman, A.T.2
-
9
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
LNCS 2139
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology - CRYPTO'01, LNCS 2139, pp. 41-62, 2001.
-
(2001)
Advances in Cryptology - CRYPTO'01
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
10
-
-
0036346553
-
Predicting internet network distance with coordinates-based approaches
-
T. S. E. Ng and H. Zhang, "Predicting internet network distance with coordinates-based approaches," in Proceedings of IEEE InfoCom'02, pp. 170-179, 2002.
-
(2002)
Proceedings of IEEE InfoCom'02
, pp. 170-179
-
-
Ng, T.S.E.1
Zhang, H.2
-
11
-
-
0041472446
-
Big-bang simulation for embedding network distances in euclidean space
-
Apr.
-
Y. Shavitt and T. Tankel, "Big-bang simulation for embedding network distances in euclidean space," in Proceedings of IEEE InfoCom'03, Apr. 2003.
-
(2003)
Proceedings of IEEE InfoCom'03
-
-
Shavitt, Y.1
Tankel, T.2
-
12
-
-
84874986305
-
-
VINT, The Network Simulator ns2.
-
VINT, The Network Simulator ns2. (http://www.isi.edu/nsnam/ns/)
-
-
-
-
14
-
-
0032178082
-
Secure group communications using key graphs
-
Sept.
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proceedings of the ACM SIGCOMM'98, pp. 68-79, Sept. 1998.
-
(1998)
Proceedings of the ACM SIGCOMM'98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
15
-
-
0034780938
-
Reliable group rekeying: a performance analysis
-
ACM Press, Aug.
-
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: a performance analysis," in Proceedings of the ACM SIGCOMM'01, pp. 27-38, ACM Press, Aug. 2001.
-
(2001)
Proceedings of the ACM SIGCOMM'01
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
16
-
-
1542715649
-
Group rekeying with limited unicast recovery
-
Apr.
-
X. Zhang, S. Lam, and D. Lee, "Group rekeying with limited unicast recovery," Computer Networks, vol. 44, no. 6, pp. 855-870, Apr. 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.6
, pp. 855-870
-
-
Zhang, X.1
Lam, S.2
Lee, D.3
-
17
-
-
0347946946
-
Protocol design for scalable and reliable group rekeying
-
Dec.
-
X. Zhang, S. Lam, D. Lee, and Y. Yang, "Protocol design for scalable and reliable group rekeying," IEEE/ACM Transactions on Networking (TON), vol. 11, no. 6, pp. 908-922, Dec. 2003.
-
(2003)
IEEE/ACM Transactions on Networking (TON)
, vol.11
, Issue.6
, pp. 908-922
-
-
Zhang, X.1
Lam, S.2
Lee, D.3
Yang, Y.4
|