-
1
-
-
0029749268
-
Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone
-
[Almeroth and Ammar 1996], Washington, DC, USA, IEEE Computer Society, [Almeroth and Ammar 1997]
-
[Almeroth and Ammar 1996]K. Almeroth and M. Ammar. Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone. In HPDC'96: Proceedings of the High Performance Distributed Computing (HPDC'96), pages 209-216, Washington, DC, USA, 1996. IEEE Computer Society.[Almeroth and Ammar 1997]
-
(1996)
HPDC'96: Proceedings of the High Performance Distributed Computing (HPDC'96
, pp. 209-216
-
-
Almeroth, K.1
Ammar, M.2
-
2
-
-
0242341057
-
Multicast group behaviour in the internet's multicast backbone (Mbone)
-
K. Almeroth and M. Ammar. Multicast group behaviour in the internet's multicast backbone (Mbone). IEEE Communications, 35(6):124-129, 1997.
-
(1997)
IEEE Communications
, vol.35
, Issue.6
, pp. 124-129
-
-
Almeroth, K.1
Ammar, M.2
-
3
-
-
77958039339
-
RFC4046: Multicast Security (MSEC) Group Key Management Architecture
-
[Baugher et al. 2005], April
-
[Baugher et al. 2005]M. Baugher, R. Canetti L. Dondeti, and F. Lindholm. RFC4046: Multicast Security (MSEC) Group Key Management Architecture. IETF RFC 4046, April 2005.
-
(2005)
IETF RFC 4046
-
-
Baugher, M.1
Canetti, L.2
Dondeti, R.3
Lindholm, F.4
-
4
-
-
15744371024
-
SAKM: A scalable and adaptive key management approach for multicast communications
-
[Challal et al. 2004]
-
[Challal et al. 2004]Y. Challal, H. Bettahar, and A. Bouabdallah. SAKM: a scalable and adaptive key management approach for multicast communications. ACM SIGCOMM Computer Communications Review, 34(2):55-70, 2004.
-
(2004)
ACM SIGCOMM Computer Communications Review
, vol.34
, Issue.2
, pp. 55-70
-
-
Challal, Y.1
Bettahar, H.2
Bouabdallah, A.3
-
5
-
-
77953145198
-
Adaptive clustering for Scalable Key Management in Dynamic Group Communications
-
[Challal et al. 2008]
-
[Challal et al. 2008]Y. Challal, S. Gharout, A. Bouabdallah, and H. Bettahar. Adaptive clustering for Scalable Key Management in Dynamic Group Communications. Inderscience International Journal of Security and Networks (IJSN), 3(2), 2008.
-
(2008)
Nderscience International Journal of Security and Networks (IJSN
, vol.3
, Issue.2
-
-
Challal, Y.1
Gharout, S.2
Bouabdallah, A.3
Bettahar, H.4
-
6
-
-
32644441025
-
Scalable key management for secure multicast communication in the mobile environment
-
[Cao et al. 2006], April
-
[Cao et al. 2006]J. Cao, L. Liao, and G. Wang. Scalable key management for secure multicast communication in the mobile environment. Pervasive and Mobile Computing, 2(2), April 2006.
-
(2006)
Pervasive and Mobile Computing
, vol.2
, Issue.2
-
-
Cao, J.1
Liao, L.2
Wang, G.3
-
8
-
-
77958032694
-
Key management with host mobility in dynamic groups
-
[Gharout et al. 2010], SIN'10, New York, NY, USA, 2010. ACM
-
[Gharout et al. 2010]S. Gharout, A. Bouabdallah, M. Kellil, and Y. Challal. Key management with host mobility in dynamic groups. In Proceedings of the 3rd international conference on Security of information and networks, SIN'10, pages 186-194, New York, NY, USA, 2010. ACM.
-
Proceedings of the 3rd International Conference On Security of Information and Networks
, pp. 186-194
-
-
Gharout, S.1
Bouabdallah, A.2
Kellil, M.3
Challal, Y.4
-
9
-
-
80054073044
-
Scalable Delayconstrained Multicast Group Key Management
-
[Gharout et al. 2008], September
-
[Gharout et al. 2008]S. Gharout, Y. Challal, and A. Bouabdallah. Scalable Delayconstrained Multicast Group Key Management. International Journal of Network Security (IJNS), 7(2):153-167, September 2008.
-
(2008)
International Journal of Network Security (IJNS)
, vol.7
, Issue.2
, pp. 153-167
-
-
Gharout, S.1
Challal, Y.2
Bouabdallah, A.3
-
10
-
-
32144436209
-
Intra-domain Group Key Management for Multicast Security
-
[Hardjono et al. 2000], September
-
[Hardjono et al. 2000]T. Hardjono, B. Cain, and I. Monga. Intra-domain Group Key Management for Multicast Security. IETF Internet draft, September 2000.
-
(2000)
IETF Internet Draft
-
-
Hardjono, T.1
Cain, B.2
Monga, I.3
-
11
-
-
0003285503
-
RFC2093: Group Key Management Protocol (GKMP) Architecture
-
[Harney and Muckenhirn 1997], July
-
[Harney and Muckenhirn 1997]H. Harney and C. Muckenhirn. RFC2093: Group Key Management Protocol (GKMP) Architecture. IETF RFC 2093, July 1997.
-
(1997)
IETF RFC 2093
-
-
Harney, H.1
Muckenhirn, C.2
-
12
-
-
77958031807
-
RFC5186: Internet Group Management Protocol Version 3 (IGMPv3)/Multicast Listener Discovery Version 2 (MLDv2) and Multicast Routing Protocol Interaction
-
[Haberman and Martin 2008], May
-
[Haberman and Martin 2008]B. Haberman and J. Martin. RFC5186: Internet Group Management Protocol Version 3 (IGMPv3)/Multicast Listener Discovery Version 2 (MLDv2) and Multicast Routing Protocol Interaction. IETF RFC 5186, May 2008.
-
(2008)
IETF RFC 5186
-
-
Haberman, B.1
Martin, J.2
-
13
-
-
33749393987
-
GKM over large MANET
-
[Hernandez-Serrano et al. 2005]
-
[Hernandez-Serrano et al. 2005]J. Hernandez-Serrano, J. Pegueroles, and M. Soriano. GKM over large MANET. Proceedings of the Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), 2005.
-
(2005)
Proceedings of the Sixth International Conference On Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop On Self-Assembling Wireless Networks (SNPD/SAWN'05)
-
-
Hernandez-Serrano, J.1
Pegueroles, J.2
Soriano, M.3
-
14
-
-
0037250819
-
Security Issues and Solutions in Multicast Content Distribution: A Survey
-
[Judge and Ammar 2003], January/ February
-
[Judge and Ammar 2003]P. Judge and M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. IEEE Network, 17(1):30-36, January/ February 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.1
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
16
-
-
77958038496
-
RFC4868: Using HMAC-SHA-256, HMAC-HA-384, and HMAC-SHA-512 with IPsec
-
[Kelly and Frankel 2007], May
-
[Kelly and Frankel 2007]S. Kelly and S. Frankel. RFC4868: Using HMAC-SHA-256, HMAC-HA-384, and HMAC-SHA-512 with IPsec. IETF RFC 4868, May 2007.
-
(2007)
IETF RFC 4868
-
-
Kelly, S.1
Frankel, S.2
-
17
-
-
52249114327
-
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
-
[Mat Kiah and Martin 2007], Washington, DC, USA, IEEE Computer Society
-
[Mat Kiah and Martin 2007]M. L. Mat Kiah and K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. In FGCN '07: Proceedings of the Future Generation Communication and Networking, pages 100-107, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
FGCN '07: Proceedings of the Future Generation Communication and Networking
, pp. 100-107
-
-
Mat, K.M.L.1
Martin, K.M.2
-
18
-
-
77958037888
-
Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments
-
[Mat Kiah and Martin 2008], January
-
[Mat Kiah and Martin 2008]M. L. Mat Kiah and K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. International Journal of Security and its Applications, 2(1):39-52, January 2008.
-
(2008)
International Journal of Security and Its Applications
, vol.2
, Issue.1
, pp. 39-52
-
-
Mat, K.M.L.1
Martin, K.M.2
-
19
-
-
84862679826
-
RFC5568: Fast Handovers for Mobile IPv6
-
[Koodli 2009], July
-
[Koodli 2009]R. Koodli. RFC5568: Fast Handovers for Mobile IPv6. IETF RFC. Status: Proposed Standard., July 2009.
-
(2009)
IETF RFC. Status: Proposed Standard
-
-
Koodli, R.1
-
20
-
-
0038391332
-
Reduction in Control Overhead for a Secure, Scalable Framework for Mobile Multicast
-
[Kamat et al. 2003], May
-
[Kamat et al. 2003]S. Kamat, S. Parimi, and D. P. Agrawal. Reduction in Control Overhead for a Secure, Scalable Framework for Mobile Multicast. IEEE International Conference on Communications, 1:98-103, May 2003.
-
(2003)
IEEE International Conference On Communications
, vol.1
, pp. 98-103
-
-
Kamat, S.1
Parimi, S.2
Agrawal, D.P.3
-
21
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
[Mittra 1997], New York, NY, USA, ACM Press
-
[Mittra 1997]S. Mittra. Iolus: a framework for scalable secure multicasting. In SIGCOMM '97: Proceedings of the ACM SIGCOMM'97 conference on Applications, technologies, architectures, and protocols for computer communication, pages 277-288, New York, NY, USA, 1997. ACM Press.
-
(1997)
SIGCOMM '97: Proceedings of the ACM SIGCOMM'97 Conference On Applications, Technologies, Architectures, and Protocols For Computer Communication
, pp. 277-288
-
-
Mittra, S.1
-
22
-
-
0012539576
-
RFC3344: IP Mobility Support for IPv4
-
[Perkins 2002], August
-
[Perkins 2002]C. Perkins. RFC3344: IP Mobility Support for IPv4. IETF RFC. Status: Proposed Standard., August 2002.
-
(2002)
IETF RFC. Status: Proposed Standard
-
-
Perkins, C.1
-
23
-
-
0141538021
-
Efficient and secure keys management for wireless mobile communications
-
[Di Pietro et al. 2002], New York, NY, USA, ACM
-
[Di Pietro et al. 2002]R. Di Pietro, L. V. Mancini, and S. Jajodia. Efficient and secure keys management for wireless mobile communications. In POMC'02: Proceedings of the second ACM international workshop on Principles of mobile computing, pages 66-73, New York, NY, USA, 2002. ACM.
-
(2002)
POMC'02: Proceedings of the Second ACM International Workshop On Principles of Mobile Computing
, pp. 66-73
-
-
di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
24
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
[Rafaeli and Hutchison 2003], September
-
[Rafaeli and Hutchison 2003]S. Rafaeli and D. Hutchison. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys, 35(3):309-329, September 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
25
-
-
26444509370
-
IP Mobile Multicast: Challenges and Solutions
-
[Romdhani et al. 2004]
-
[Romdhani et al. 2004]I. Romdhani, M. Kellil, H-Y. Lach, A. Bouabdallah, and H. Bettahar. IP Mobile Multicast: Challenges and Solutions. IEEE Communications Surveys & Tutorials, 6(1), 2004.
-
(2004)
IEEE Communications Surveys & Tutorials
, vol.6
, Issue.1
-
-
Romdhani, I.1
Kellil, M.2
Lach, H.-Y.3
Bouabdallah, A.4
Bettahar, H.5
-
27
-
-
77958076385
-
RFC5110: Overview of the Internet Multicast Routing Architecture
-
[Savola 2008], January
-
[Savola 2008]P. Savola. RFC5110: Overview of the Internet Multicast Routing Architecture. IETF RFC 5110, January 2008.
-
(2008)
IETF RFC 5110
-
-
Savola, P.1
-
28
-
-
0033893174
-
Secure Group Communications Using Key Graphs
-
[Wong et al. 2000], February
-
[Wong et al. 2000]C. K. Wong, M. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, February 2000.
-
(2000)
IEEE/ACM Transactions On Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
29
-
-
0003978251
-
RFC2627: Key Management for Multicast: Issues and Architecture
-
[Wallner et al. 1999], June
-
[Wallner et al. 1999]D. Wallner, E. Harder, and R. Agee. RFC2627: Key Management for Multicast: Issues and Architecture. IETF RFC 2627, June 1999.
-
(1999)
IETF RFC 2627
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
30
-
-
3943050736
-
A survey of application level multicast techniques
-
[Yeo et al. 2004], September
-
[Yeo et al. 2004]C.K. Yeo, B.S. Lee, and M.H. Er. A survey of application level multicast techniques. Computer Communications, 27(15):1547-1568, September 2004.
-
(2004)
Computer Communications
, vol.27
, Issue.15
, pp. 1547-1568
-
-
Yeo, C.K.1
Lee, B.S.2
Er, M.H.3
-
31
-
-
1642403770
-
Comparison of inter-area rekeying algorithms for secure wireless group communications
-
[Zhang et al. 2002]
-
[Zhang et al. 2002]C. Zhang, B. DeCleene, J. Kurose, and D. Towsley. Comparison of inter-area rekeying algorithms for secure wireless group communications. Perform. Eval., 49(1-4):1-20, 2002.
-
(2002)
Perform. Eval
, vol.49
, Issue.1-4
, pp. 1-20
-
-
Zhang, C.1
Decleene, B.2
Kurose, J.3
Towsley, D.4
|