References
- B. Quinn, K. Almeroth, 'IP Multicast Application: Challenges and Solutions,' RFC3170, Sep., 2001
- C. Diot, B. N. Levine, B. Lyles, H. Kassem, D. Balensiefen, 'Deployment Issues for the IP Multicast Service and Architecture,' IEEE Network, Vol.14, pp.88-98, Jan., 2000 https://doi.org/10.1109/65.819174
- A. Perrig, R. Canetti, D. Song and J. D. Tygar, 'Efficient and Secure Source Authentication for Multicast,' Proceedings of Network and Distributed System Security Symposium(NDSS) 2001, Feb., 2001
- R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor and B. Pinkas, 'Multicast Security: A Taxonomy and Some Efficient Constructions,' INFOCOM'99, Vol.2, pp.708-716, Mar., 1999 https://doi.org/10.1109/INFCOM.1999.751457
- A. Perrig, R. Canetti, D. Song, D. Tygar and B. Briscoe, 'TESLA : Multicast Source Authentication Transform Introduction,' Internet draft, IETF, 2002
- A. Perrig, R. Canetti and B. Whillock, 'TESLA: Multicast Source Authentication Transform Specification,' Internet draft, IETF, 2002
- C. K. Wong and S. S. Lam, 'Digital Signatures for Flows and Multicasts,' IEEE Trans. on Networking, Vol.7, No.4, pp.502-513, Aug., 1999 https://doi.org/10.1109/90.793005
- R. Merkel, 'A Certified Digital Signature,' Advanced in Cryptology(CRYPTO '89), pp.218-238, Aug., 1989
- A. Perrig, R. Canetti, J. D. Tygar and D. Song, 'Efficient Authentication and Signing of Multicast Streams over Lossy Channels,' Proc. of IEEE Symposium on Security and Privacy, pp.56-73, May, 2000
- R. L. Rivest, A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signatures and Public Key Cryptosystems,' Communications of the ACM, Vol.21, No.2, pp.120-126, 1978 https://doi.org/10.1145/359340.359342
- P. Rohatgi, 'A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication,' Proc. of ACM Conference on Computer and Communications Security, Nov., 1999 https://doi.org/10.1145/319709.319722
- M. Borella, D. Swider, S. Uludag and G. Brewster, 'Internet Packet Loss: Measurement and Implications for End-to-End QoS,' In Proc. of the International Conference on Parallel Processing, pp.3-15, 1998 https://doi.org/10.1109/ICPPW.1998.721868
- V. Paxson, 'End-to-End Internet Packet Dynamics,' IEEE/ACM Trans. on Networking, Vol.12, No.5, pp.277-292, 1999 https://doi.org/10.1109/90.779192
- 'The Network Simulator : ns-2,' http://www.isi.edu/nsnam/ns/
- 'Crypto++,' http://www.eskimo.com./~weidai/cryptlib.html
- R. L. Rivest, 'The MD5 Message Digest Algorithm,' RFC 1321, 1992
- W. Stalling, Network Security Essentials: Application and Standards, Prentice Hall, 2001
- A. Perrig, 'The BiBa One-Time Signature and Broadcast Authentication Protocol,' ACM Conference on Computer and Communications Security, pp.28-37, 2001