메뉴 건너뛰기




Volumn , Issue , 1995, Pages 2-16

Multicast-specific security threats and counter-measures

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; MULTICASTING; SECURITY SYSTEMS;

EID: 84957607836     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NDSS.1995.390649     Document Type: Conference Paper
Times cited : (71)

References (27)
  • 3
    • 85063365569 scopus 로고
    • Ipv6 security architecture
    • September
    • R. Atkinson. Ipv6 Security Architecture. Work in progress, September 1994.
    • (1994) Work in Progress
    • Atkinson, R.1
  • 6
    • 0024942817 scopus 로고
    • Sirpent: A high performance inter-networking approach
    • ACM SIG-COMM, September
    • D.Cheriton. Sirpent: A High Performance Inter-networking Approach. In Conference Proceedings of ACM Sigcomm’89, pages 158-169. ACM SIG-COMM, September 1989.
    • (1989) Conference Proceedings of ACM Sigcomm’89 , pp. 158-169
    • Cheriton, D.1
  • 12
    • 0024749922 scopus 로고
    • Security on networks: Do we really need it?
    • R. Grimm. Security on Networks: Do We Really Need It? Computer Networks and ISDN Systems, 17:315-323, 1989.
    • (1989) Computer Networks and ISDN Systems , vol.17 , pp. 315-323
    • Grimm, R.1
  • 16
    • 0026242187 scopus 로고
    • Security in open networks and distributed systems
    • P. Janson and R. Molva. Security in Open Networks and Distributed Systems. Computer Networks and ISDN Systems, 22:323-346,1991.
    • (1991) Computer Networks and ISDN Systems , vol.22 , pp. 323-346
    • Janson, P.1    Molva, R.2
  • 18
    • 0040268965 scopus 로고
    • Internet privacy enhanced mail
    • August
    • S. T. Kent. Internet Privacy Enhanced Mail. Communications of the ACM, 36(8):48-59, August 1993.
    • (1993) Communications of The ACM , vol.36 , Issue.8 , pp. 48-59
    • Kent, S.T.1
  • 20
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, 1978.
    • (1978) Communications of The ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 24
    • 85063399807 scopus 로고
    • Scalable feeback control for multicast video distribution in the internet
    • January
    • I. Wakeman J. Balot T. and Turletti. Scalable Feeback Control for Multicast Video Distribution in the Internet. Submitted to ACM Sigcomm '94, January 1994.
    • (1994) Submitted to ACM Sigcomm '94
    • Wakeman, I.1    Balot, J.2    Turletti3
  • 26
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • V. Voydock and S. Kent. Security Mechanisms in High-Level Network Protocols. ACM Computing Surueys, 15(2):135-171, 1983.
    • (1983) ACM Computing Surueys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.1    Kent, S.2
  • 27
    • 0003718702 scopus 로고
    • An architecture for IP address allocation with CIDR
    • September
    • T. Li Y. Rekhter. An Architecture for IP Address Allocation with CIDR. RFC 1518, September 1993.
    • (1993) RFC 1518
    • Li, T.1    Rekhter, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.