1 |
T. Aurisch, "Using key trees for securing military multicast communication", IEEE Milcom 04, 2004
|
2 |
T. Aurisch, "Optimization Techniques for Military Multicast Key Management," IEEE MILCOM, Vol.4, pp.2570-2576, 2005
|
3 |
A. Perrig, D. Song, and J. Tygar, "ELK, a new protocol for efficient large-group key distribution," IEEE Security and Privacy Symposium 2001, May. 2001
|
4 |
정윤찬, 임진우, 김석중, 권오주, "군 네트워크에서 멀티케스트 기반의 키 관리 기법 설계,"제12차 통신/전자 학술대회 프로시딩, 국방과학연구소(서울) 10월 2008
|
5 |
Trung H. Tran, "Proactive Multicast-based IPSec Discovery Protocol and Multicast Extension," IEEE MILCOM, pp.1-7, Oct. 2006
|
6 |
T. Aurisch, "Using key trees for securing military multicast communication" IEEE MILCOM, Vol.3, pp.1377-1383, 2004
|
7 |
C. Wong, M. Gouda, and S. Lam, "Secure Group Communications using Key Graphs," ACM SIGCOMM'98, 1998
|
8 |
RFC 2627, D. Wallner, E. Harder and R. Agee "Key Management for Multicasts: Issues and Architectures,", Jun. 1999
|
9 |
S. Rafaeli, L. Mathy, and D. Hutchison, "EHBT: An efficient protocol for group key management," Third International COST Workshop (NGC 2001), Nov. 2001
|
10 |
RFC 2409, "The Internet Key Exchange (IKE)," Nov. 1998[2]
|
11 |
RFC 2407, "The Internet Security Association Key Management Protocol," Nov. 1998
|
12 |
C. K. Wong, M. G. Gouda, S. S. Lam, "Secure group communications using key graphs," ACM SIGCOMM'98, 1998
|
13 |
INSC2/TASK2/DU/003, "Secure Multicast Architecture," Aug. 2004
|
14 |
INSC II/TASK1/D/002, "Test and Demonstration Architecture," Feb. 2005
|