References
- W. Fenner, 'Internet Group Management Protocol, Version 2,' RFC 2236, Nov
- B. Cain, S. Deering, I. Kouvelas, B. Fenner, and A. Thyagarajan, 'InternetGroup Management Protocol, Version 3,' RFC 3376, Oct. 2002
- L. Gong and N. Shacham, 'Elements of trusted multicasting,' in Proceedings of2nd ACM Conference on Computer and Communications Security, Fairfax,1994, pp. 176-183
- T. Hayashi, H. He, H. Satou, H. Ohta, S. Vaidya, 'Accounting, Authentication and Authorization Issues in Managed IP Multicasting Services', Internet Draft, draft-hayashi-maccnt-02.txt, Feb. 2005
- T. Hardjono and B. Cain 'Key Establishment for IGMP Authentication in IPECUMN,' France, Oct. 2000, pp. 247-52
- H. He, T. Hardjono, and B. Cain, 'Simple Multicast Receiver Access Control,' Internet draft, draft-irtf-gsec-smrac-00.txt, Nov. 2001
- P. Judge and M. Ammar, 'Gothic: A Group Access Control Architecture forMulticast and Anycast,' IEEE INFOCOM, New York, June 2002, pp. 1547-56
- C. Castelluccia and G. Montenegro, 'Securing Group Management in IPv6 withCryptographically Based Addresses,' Proc. 8th IEEE International Symposium on Computer andCommunication, Turkey, July 2003, pp. 588-93
- N. Ishikawa, N. Yamanouchi, O. Takahashi, 'IGMP Extension for Authentication of IP Multicast,' Internet Draft, draft-ishikawaigmp-auth-01.txt, Aug. 1998
- N. Yamanouchi, N. Ishikawa, Takahashi, 'RADIUS Extension for Multicast Router Authentication,' Internet Draft, draft-yamanouchi-radius-ext-00.txt, Mar. 1998
- H. Ueno, H. Suzuki, N. Ishikawa, and O. Takahashi, 'A Receiver Authenticationband Group Key Delivery Protocol for Secure Multicast,' IEICE Trans. onvol. E88-B, no. 3, Mar. 2005, pp. 1139-1148 https://doi.org/10.1093/ietcom/e88-b.3.1139
- T. Hayashi, D. Andou, H. He, W. Tawbi, and T. Niki, 'IGMP for user Authentication Protocol (IGAP),' Internet Draft, draft-hayashi-igap-00.txt, Oct. 2002
- B. Coan, V. Kaul, S. Narain, W. Stephens, 'HASM: Hierachical Application-Level Secure Multicast,' Internet Draft, draft-coan-hasm-00.txt, Nov. 2001
- R. M. Needham and M. D. Schroeder, 'Using Encryption for Authentication in Large Networks of Computers,' Communications of the ACM, vol.21, 1978, pp. 993-999 https://doi.org/10.1145/359657.359659
- M. Baugher, R. Canetti, L. Dondeti, and F. Lindholm, 'Multicast Security (MSEC) Group Key Management Architecture,' RFC 4046, Apr. 2005
- L. Lamport, 'Password authentication with insecure communication,' Communications of the ACM, vol. 24, no.11, 1981, pp. 770-772 https://doi.org/10.1145/358790.358797
- M. Handley, C. Perkins, and E. Whelan, 'Session Announcement Protocol,' RFC 2974, Oct. 2000
- M. Baugher, B. Weis, T. Hardjono, H. Harney, 'The Group Domain of Interpretation,' RFC 3547, July 2003
- T. Hayashi, H. He, H. Satou, H. Ohta, S. Vaidya, 'Issues Related to Receiver Access Control in the Current Multicast Protocols,' Internet Draft, draft-ietf-mboned-rac-issues-00.txt, July 2005