References
-
C. Semeria T. Maufer, 'Introduction to IP Multicast Routing,'
, January 1997 - A. Ballardic, 'Scalable Multicast Key Distribution,' Request for Comments 1949, Internet Activities Board, April 1996
- H. Harney, C. Muckenhim, 'Group Key Management Protocol(GKMP) Specification.'Request for Comments 2093, Internet Activities Board, July 1997
- H. Harney, C Muckenhim, 'Group Key Management Protoco(GKMIP) Architecture,' Request for Comments 2094, Internet Activities Board. July 1997
- A Ballardie. 'Core Based Trce(CBT) Multicast Routing Architecture,' Request for Comments 2201, Internet Activities Board, Sept 1997
- A. Ballardie, 'Core Based Tree(CBT version 2) Multicast Routing-Protocol Specification,' Request for Comments 2189, Internet Activiues Board, Sept 1997
- T. Ballardie, J Croweroft, 'Multicast-specific security threats and counter-measure,' Proceedings of the Symposium on Network and Distributed ?System Security, San Diego, California, February 1995
- Thomas A, Maufer, 'Deploying IP Multicast in the Enterprise,' Prentice Hall, 1997
- Suvo Mittra, 'A Framework for Scalable Secure Multicasting,' In proceedings of ACM SIGCOMM '97, pp.277-288. Sept 1997
- G Caronni. M Waldvogel. D Sun, B. Plattner, 'Efficient Security for Large and Dynamic Multicast Group,' in the proceedings of 7th Workshop on Enabling Technologies, (WETICE '98), IEEE Computer Society Press, 1998 https://doi.org/10.1109/ENABL.1998.725721
- L Gong, N. Shacharn, 'Multicast Security and its extension to a mobile environment,' ACM-Baltzer Journal of Wireless Networks, October 1994 https://doi.org/10.1007/BF01200847
- L. Gong, N. Shacham, 'Elements of Trusted Multicasting,' Technical Report SRl-CSL-94-03, Computer Science Laboratory, SRI Internationai, Menlo Park, California, March 1994