References
- D. McGrew and A. Sherman, Key Estabilishment in Large Dynamic Groups Using One-Way Function Trees, TIS Report No.0755, 1998
- C. Wong, M. Gouda and S. Lam, Secure Group Communications Using Key Graphs, Proc. of the ACM SIGCOMM'98, pp.68-79, 1998 https://doi.org/10.1145/285243.285260
- D. Wallner, E. Harder and R. Agee, Key Management for Multicast: Issues and Architectures, IETF Request For Comments, RFC 2627, June, 1999
- D. Naor, M. Naor and J. Lotspiech, Revocation and Tracing Schemes for Stateless users, Advances in Cryptology-Crypto'01, LNCS 2139, pp.41 -62, 2001
- D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme, Advances in Cryptology-Crypto'02, LNCS 2442, pp.47-60, 2002
- X. Li, Y. Yang, M. Gouda and S. Lam, Batch Rekeying for Secure Group Communications, Proc. of World Wide Web Conference 10 (WWW10), 2001 https://doi.org/10.1145/371920.372153
- Y. Yang, X. Li, X. Zhang and S. Lam, Reliable group rekeying : Design and Performance Analysis, Proc. of ACM SIGCOMM 2001, pp.27-38, 2001 https://doi.org/10.1145/383059.383062
- D. Naor and B. Pinkas, Efficient Trace and Revoke Schemes, Financial Cryptography 2000, LNCS 1962, pp.1 -21, 2000
- C. Wong and S. Lam, Keystone: A Group Key Management Service, International Conference on Telecommunications, ICT 2000, 2000
- A. Perrig, D. Song and J. Tygar, ELK, a New Protocol for Efficient Large-Group Key Distribution, Proc. of the IEEE Symposium on Security and Privacy, pp.247 -262, 2001 https://doi.org/10.1109/SECPRI.2001.924302
- J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean, Self-Healing Key Distribution with Revocation, Proc. of the IEEE Symposium on Security and Privacy, pp. 224-240, 2002 https://doi.org/10.1109/SECPRI.2002.1004375
- C. Blundo, P. D'Arco and M. Listo, A New Self-healing Key Distribution Scheme, Proceedings of the IEEE Symposium on Computers and Communications(ISCC 2003), pp.803-808, 2003 https://doi.org/10.1109/ISCC.2003.1214216
- C. Blundo, P. D'Arco, A. Santis and M. Listo, Design of Self-healing Key Distribution Schemes, Design Codes and Cryptography, N.32, pp.15-44, 2004 https://doi.org/10.1023/B:DESI.0000029210.20690.3f
- D. Liu, P. Ning and Sun, Efficient Self-Healing Key Distribution with Revocation Capability, Proceedings of the 10-th ACM Conference on Computer and Communications Security, pp.231-240, 2003. https://doi.org/10.1145/948109.948141
- 오명욱, 김성열, 배용근, 정일용, '효율적인 그룹키 분배 및 갱신을 위한 보안 프로토콜의 설계', 정보처리학회논문지C, Vol. 9C, No.3, 2002년 6월, pp.331-336 https://doi.org/10.3745/KIPSTC.2002.9C.3.331
- 한근희, '멀티캐스트 환경에서 효율적인 그룹키 관리를 위한 트리구조 및 알고리즘 개발', 정보처리학회논문지B, Vol. 9B, No.5, 2002년 10월, pp.587-598 https://doi.org/10.3745/KIPSTB.2002.9B.5.587
- 김현주, 남정현, 김승주, 원동호, '유료 방송 시스템에 적합한 ID 기반의 2 라운드 그룹키 동의 프로토콜', 한국정보보호학회 논문지, Vol.15, No.1, 2005년 2월, pp.41-55