-
3
-
-
0033356116
-
A survey of security issues in multicast communications
-
Nov./Dec.
-
M.J. Moyer, J.R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, pp. 12-23. Nov./Dec. 1999.
-
(1999)
IEEE Network
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
4
-
-
0003285503
-
Group key management protocol (GKMP) architecture
-
July
-
H. Harney and C-. Muckenhirn, "Group key management protocol (GKMP) architecture," RFC 2094, July 1997.
-
(1997)
RFC
, vol.2094
-
-
Harney, H.1
Muckenhirn, C.2
-
5
-
-
0036349003
-
Gothic: A group access control architecture for secure multicast and anycast
-
P. Judge and M. Ammar, "Gothic: A group access control architecture for secure multicast and anycast," in Proceedings of the IEEE INFOCOM'02, 2002, pp. 1547-1556.
-
(2002)
Proceedings of the IEEE INFOCOM'02
, pp. 1547-1556
-
-
Judge, P.1
Ammar, M.2
-
6
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proceedings of the IEEE INFOCOM'99, 1999. pp. 708-716.
-
(1999)
Proceedings of the IEEE INFOCOM'99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
7
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C.K. Wong, M. Gouda, and S.S. Lam, "Secure group communications using key graphs," IEEE Transactions on Networking, vol. 8. no. 1. pp. 16-30. Feb 2000.
-
(2000)
IEEE Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
8
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and J.D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in Proceedings of the IEEE Symposium on Security and Privacy, 2001. pp. 247-262.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
9
-
-
0003285501
-
Group key management protocol (GKMP) specification
-
July
-
H. Harney and C. Muckenhirn, "Group key management protocol (GKMP) specification," RFC 2093. July 1997.
-
(1997)
RFC
, vol.2093
-
-
Harney, H.1
Muckenhirn, C.2
-
10
-
-
0003978251
-
Key management for multicast: Issues and architecture
-
draft-wallner-key-arch-00.txt, June
-
D. Wallner, E. Harder, and R. Agee, "Key management for multicast: Issues and architecture," Internet-Draft draft-wallner-key-arch-00.txt, June 1997.
-
(1997)
Internet-draft
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
11
-
-
0032627571
-
Key management for secure internet multicast using boolean function minimization techniques
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key management for secure internet multicast using boolean function minimization techniques," in Proceedings of the IEEE INFOCOM'99, 1999. vol. 2. pp. 689-698.
-
(1999)
Proceedings of the IEEE INFOCOM'99
, vol.2
, pp. 689-698
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
12
-
-
0031629148
-
CLIQUES: A new approach to group key agreement
-
M. Steiner, G. Tsudik, and M. Waidner, "CLIQUES: a new approach to group key agreement," in Proceedings of the 18th International Conference on Distributed Computing Systems, 1998, pp. 380-387.
-
(1998)
Proceedings of the 18th International Conference on Distributed Computing Systems
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
13
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
ACM Press
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, pp. 235-244, ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
15
-
-
0036285009
-
An efficient key management scheme for secure wireless multicast
-
Y. Sun, W. Trappe, and K.J.R. Liu, "An efficient key management scheme for secure wireless multicast," in Proceedings of the IEEE International Conference on Communications, 2002. vol. 2. pp. 1236-1240.
-
(2002)
Proceedings of the IEEE International Conference on Communications
, vol.2
, pp. 1236-1240
-
-
Sun, Y.1
Trappe, W.2
Liu, K.J.R.3
-
17
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
ACM Press
-
S. Mittra, "Iolus: a framework for scalable secure multicasting," in Proceedings of the ACM SIGCOMM'97. 1997, pp. 277-288, ACM Press.
-
(1997)
Proceedings of the ACM SIGCOMM'97
, pp. 277-288
-
-
Mittra, S.1
-
18
-
-
0036800721
-
Scalable secure group communication over IP multicast
-
Oct.
-
S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over IP multicast," IEEE Journal on Selected Areas in Communications, vol. 20, no. 8. pp. 1511-1527, Oct. 2002.
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.8
, pp. 1511-1527
-
-
Banerjee, S.1
Bhattacharjee, B.2
-
19
-
-
0000636954
-
The versayKey framework: Versatile group key management
-
Sept.
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Planner, "The VersayKey framework: Versatile group key management," IEEE Journal on Selected Areas in Communications, pp. 1614-1631. Sept. 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Planner, B.5
-
20
-
-
0036283163
-
Establishment of conference keys in heterogeneous networks
-
W. Trappe, Y. Wang, and K.J.R. Liu, "Establishment of conference keys in heterogeneous networks," in Proceedings of the IEEE International Conference on Communications, 2002, pp. 1236-1240.
-
(2002)
Proceedings of the IEEE International Conference on Communications
, pp. 1236-1240
-
-
Trappe, W.1
Wang, Y.2
Liu, K.J.R.3
-
21
-
-
0036286367
-
A time-efficient contributory key agreeement scheme for secure group communications
-
B. Sun, W. Trappe, Y. Sun, and K.J.R. Liu, "A time-efficient contributory key agreeement scheme for secure group communications," in Proceedings of the IEEE International Conference on Communications, 2002, pp. 1159-1163.
-
(2002)
Proceedings of the IEEE International Conference on Communications
, pp. 1159-1163
-
-
Sun, B.1
Trappe, W.2
Sun, Y.3
Liu, K.J.R.4
-
22
-
-
0037968839
-
Performance optimizations for group key management schemes
-
S. Zhu, S. Setia, and S. Jajodia, "Performance optimizations for group key management schemes," in Proceedings of the 23rd International Conference on Distributed Computing Systems, 2003, pp. 163-171.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems
, pp. 163-171
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
23
-
-
0003308056
-
Scalable multicast key distribution
-
May
-
A. Ballardie, "Scalable multicast key distribution," RFC 1949, May 1996.
-
(1996)
RFC
, vol.1949
-
-
Ballardie, A.1
-
25
-
-
0035001560
-
A lower bound for multicast key distribution
-
J. Snoeyink, S. Suri, and G. Varghese, "A lower bound for multicast key distribution," in Proceedings of the IEEE INFOCOM'01, 2001, vol. 1. pp. 422-431.
-
(2001)
Proceedings of the IEEE INFOCOM'01
, vol.1
, pp. 422-431
-
-
Snoeyink, J.1
Suri, S.2
Varghese, G.3
-
26
-
-
0004135561
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
August
-
D. Balenson, D. McGrew, and A. Sherman, "Key management for large dynamic groups: One-way function trees and amortized initialization," IETF Internet draft (work in progress). August 2000.
-
(2000)
IETF Internet Draft (Work in Progress)
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
27
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6. pp. 644-654, November 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
28
-
-
0020180459
-
A conference key distribution system
-
September
-
I. Ingemarsson, D.T. Tang, and C.K. Wong, "A conference key distribution system," IEEE Transactions on Information Theory, vol. IT-28, no. 5. pp. 714-720, September 1982.
-
(1982)
IEEE Transactions on Information Theory
, vol.IT-28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
-
30
-
-
0027606916
-
Hardware implementation of montgomery's modular multiplication algorithm
-
June
-
S.E. Eldridge and C.D. Walter, "Hardware implementation of montgomery's modular multiplication algorithm," IEEE Transactions on Computers, vol. 42. no. 6. pp. 693-699, June 1993.
-
(1993)
IEEE Transactions on Computers
, vol.42
, Issue.6
, pp. 693-699
-
-
Eldridge, S.E.1
Walter, C.D.2
-
32
-
-
0004116989
-
-
chapter 7, The MIT Press and McGraw-Hill Book Company, second edition
-
T.H. Corman, C.E. Leiserson, and R.L. Rivest, Introduction to algorithms, chapter 7, The MIT Press and McGraw-Hill Book Company, second edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Corman, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
-
33
-
-
0242341057
-
Multicast group behavior in the internet's multicast backbone (MBone)
-
June
-
K.C. Almeroth and M.H. Ammar, "Multicast group behavior in the Internet's multicast backbone (MBone)," IEEE Communications Magazine, pp. 124-129, June 1997.
-
(1997)
IEEE Communications Magazine
, pp. 124-129
-
-
Almeroth, K.C.1
Ammar, M.H.2
-
34
-
-
0033893150
-
A long-term analysis of growth and usage patterns in the multicast backbone (MBone)
-
March
-
K.C. Almeroth, "A long-term analysis of growth and usage patterns in the multicast backbone (MBone)," in Proceedings of the IEEE INFOCOM'00, March 2000, vol. 2. pp. 824-833.
-
(2000)
Proceedings of the IEEE INFOCOM'00
, vol.2
, pp. 824-833
-
-
Almeroth, K.C.1
-
35
-
-
84862462566
-
-
March
-
MBone user activity data, "ftp://ftp.cc.gatech.edu/people/kevin/ release-data," March 2003.
-
(2003)
MBone User Activity Data
-
-
|