참고문헌
- Y. Kim, A. "Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in proc. of the 7th ACM Conference in Computer and Communication Security, CCS 2000, Athens, Greece, Nov. 2000, pp. 235-241
- C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEEI ACM Trans. Networking, vol.8, pp.l6-30, Feb. 2000
- D. Wallner, E. Harder, and R. Agee, "Key management for multicast: issues and architectures," Internet Draft (RFC 2627)} , Sep. 1998
- D. Balenson, D. McGrew, and A. Shennan, "Key management for large dynamic groups: One-way function trees and amortized initialization," Internet Draft Report, Feb. 2000
- R. Canetti, J. Garay, G. Itlus, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in proc. IEEE INFO COM, vol.2, Mar. 1999. pp.708-716
- W. Trappe, J. Song, R. Poovendran, and K. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans. Multimedia, vol.5, no.4, pp.544-557, Dec. 2003 https://doi.org/10.1109/TMM.2003.1244817
- Y. Sun, W. Trappe, and K. Liu, "An efficient ke management scheme for secure wireless multicast," in proc. IEEE Int. Corif', Communications, ICC 2002, New York City, CA, May 2002, pp. 1236-1240
- Y. Sun, W. Trappe, and K. Liu, "Topology-aware key management schemes for wireless multicast," in proc. IEEE Global Telecommunications Corif',. GLOBECOM'02, San Francisco, CA, Dec. 2003. pp.1471-1475
- Y. Sun, W. Trappe, and K. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Networking, vol.12, pp.653-666, Aug. 2004 https://doi.org/10.1109/TNET.2004.833129
- L. Lazos and R. Poovendran, "Energy-aware secure multicast communication in ad-hoc networks using geographical location information," in proc. IEEE ICASSP 2003, Hong Kong, China, April 2003, pp.201-204
- L. Lazos and R. Poovendran, "Power proximity based key management for secure multicast in ad hoc networks," ACMISpringer J Wireless Networks (WINETJ), vol.l3. no.1, pp.127-148, Feb. 2007 https://doi.org/10.1007/s11276-006-6057-9
- L. Lazos and R. Poovendran, "Cross-layer design for energy-efficient secure multicast communications in ad hoc networks," in proc. IEEE Int. Corif', Communications, ICC 2004, Paris, France, pp.3633-3639, May 2004
- L. Lazos, J. Salido, and R. Poovendran, "VP3: using vertex path and power proximity for energy efficient key distribution," in Proc. IEEE Vehicular Technology Corif'" VTC 2004, Los Angeles, CA, Sep. 2004, pp.1228-1232
- J. Salida, L. Lazos, and R. Poovendran, "Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach," IEEE/ ACM Trans. Networking, vol.12, pp.653-666, Aug. 2004 https://doi.org/10.1109/TNET.2004.833129
- Y. Sun and K. Liu, "Hierarchical group access control for secure multicast communications," IEEE/ ACM Trans. Networking, vol.15, no.6, pp. 1514-1526, Dec. 2007 https://doi.org/10.1109/TNET.2007.897955
- D. R. Stinson, Cryptography - Theory and Practice, 3rd Ed., Chapman & Hall/CRC, 2006
- http://grouper.ieee.org/ groups/S02/11IReports/tgs_update.htm
- Y. Vardi, "Metrics useful in network tomography studies," IEEE Signal Process. Lett., vol.11, no.3, pp.353-355, Mar. 2004 https://doi.org/10.1109/LSP.2003.821737
- J. Robinson, E. Knightly, "A perfonnance study of deployment factors in wireless mesh networks," in proc. IEEE INFOCOM 2007, Anchorage, AK, May 2007, pp.2054-2062
- A. Hayter, Probabiliby and statistics for engineers and scientists, Thomson Brooks/Cole, 2007
- M. M. Zonoozi and P Dassanayake, "User mobility modeling and characterization of mobility patterns," IEEE J. Selected Areas Commun., vol.15, pp.1239-1252, Sept. 1997 https://doi.org/10.1109/49.622908