1 |
O.Rodeh, K.P.Birman, and D.Dolev, "Optimized Group Rekey for Group Communication Systems", Network and Distributed Systems Security, 2000.
|
2 |
Yong-Deug Jung, Dae-Woo Park, and Moon-Seog Jun, "The Analysis of New Video Conference System for Secure Communications", GESTS International Trans-action on Computer Science and Engineering Volume 2, Number 1, March 2005.
|
3 |
Giuseppe Ateniese, Michael Steiner, and Gene Tsudik, "New Multiparty Authentication Services and Key Agreement Protocols". IEEE Journal on selected areas in communication, Vol. 18,No.4, April 2000.
|
4 |
R. Rivest, A Description of the RC2(r), "Encryption Algorithm", IETF RFC 2268, 1998.
|
5 |
Radha Poovendran and John S.Baras, "An Information Theoretic Approach for Design and Analysis of Rooted Tree Based Multicast key Management Schemes", IEEE Transaction on Information Theory, Vol.47, No.7, November 2001.
|
6 |
Richard J,Spillman, "Classical and Contemporary Cryptology", Pearson PrenticeHall, 2005.
|
7 |
L.Lo Iacono and C.Ruland, "Confidential Multimedia Communication in IP Networks", Proceedings of 8th IEEE International Conference on communication Systems, Singapore, 2002.
|
8 |
M. Baugher, D.McGrew, D.Oran, R. Blom, E.Carrara, M,Naslund, and K.Norrman, "The Secure Real-time Transport Protocol", IETF RFC 3711, 2004.
|
9 |
William stallings, "Cryptography and Network security", Prentice Hall, 1998.
|
10 |
Sandra Rafaeli and David Hutchison, "A Survey of Key Management for Secure Group Commu nication" ACM Computing Surveys, Vol. 35, No.3, September 2003, pp.309-329.
DOI
ScienceOn
|
11 |
E. Rescorla, "Diffie-Hellman Key Agreement Method", IETF RFC 2631, 1999.
|
12 |
M.Handley, H.Schulzrinne, E.Schooler, and J.Rosenberg, "SIP : Session Initiation Protocol", IETF RFC 3261, 2002.
|
13 |
L. Berc, W. Fenner, R. Frederick, and S. McCanne, "RTP Payload Format for JPEG-compressed Video," RFC 2035, October, 1996.
|
14 |
ITU-T Online site http:/ /www.itu.int/ rec/ recomm-endation.asp?type=folders &lang=e&parent=T-REC -H.323
|