1 |
N. T. Jahromi et al., An NFV and microservice based architecture for on-the-fly component provisioning in content delivery networks, in Proc. IEEE Annu. Consum. Commun. Netw. Conf. (CCNC), (Las Vegas, NV, USA), Jan. 2018, pp. 1-7.
|
2 |
H. Hawilo, M. Jammal, and A. Shami, Exploring microservices as the architecture of choice for network function virtualization platforms, IEEE Netw. 33 (2019), 202-210.
DOI
|
3 |
A. Sheoran et al., Contain-ed: An NFV micro-service system for containing e2e latency, ACM SIGCOMM Comput. Commun. Rev. 47 (2017), 54-60.
DOI
|
4 |
C. Chiou, Secure broadcasting using the secure lock, IEEE Trans. Softw. Eng. 15 (1989), no. 8, 929-934.
DOI
|
5 |
W. C. Kei, M. Gouda, and S. S. Lam, Secure group communications using key graphs, IEEE/ACM Trans. Netw. 8 (2000), no. 1, 16-30.
DOI
|
6 |
M. Burmester and Y. Desmedt, A secure and scalable group key exchange system, Inf. Process. Lett. 94 (2005), 137-143.
DOI
|
7 |
X. Guo and J. Zhang, Secure group key agreement protocol based on chaotic Hash, Inform. Sci. 180 (2010), 4069-4074.
DOI
|
8 |
Q. Wu et al., Asymmetric group key agreement, in Advances in Cryptology-EUROCRYPT 2009, vol. 5479, Springer, Berlin, Heidelberg, Germany, 2009, 153-170.
|
9 |
N. Sakamoto, An efficient structure for LKH key tree on secure multicast communications, in Proc. IEEE/ACIS Int. Conf. Softw. Eng., Artif. Intell., Netw. Parallel/Distrib. Comput. (SNPD), (Las Vegas, NV, USA), June 2014, pp. 1-7.
|
10 |
S. Mittra, Iolus: A framework for scalable secure multicasting, ACM SIGCOMM Comput. Commun. Rev. 27 (1997), no. 4, 277-288.
DOI
|
11 |
Y. Tsiounis and M. Yung, On the security of ElGamal based encryption, in Public Key Cryptography, vol. 1431, Springer, Berlin, Heidelberg, Germany, 1998, 117-134.
|
12 |
Y. Challal et al., Adaptive clustering for scalable key management in dynamic group communications, Int. J. Secur. Netw. 3 (2008), 133-146.
DOI
|
13 |
A. Mehdizadeh, F. Hashim, and M. Othman, Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks, J. Netw. Comput. Appl. 42 (2014), 59-69.
DOI
|
14 |
W. Song et al., A practical group key management algorithm for cloud data sharing with dynamic group, China Commun. 13 (2016), 205-216.
|
15 |
D. Coppersmith, A. M. Odlzyko, and R. Schroeppel, Discrete logarithms inGF(p), Algorithmica 1 (1986), 1-15.
DOI
|
16 |
T. Elgamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Inf. Theory 31 (1985), 469-472.
DOI
|
17 |
Y. Piao et al., Polynomial-based key management for secure intra-group and inter-group communication, Comput. Math. Appl. 65 (2013), 1300-1309.
DOI
|
18 |
C. Li and C. Xu, Scalable group key exchange protocol with provable security, COMPEL-The Int. J. Comput. Math. Electr. Electron. Eng. 32 (2013), 612-619.
DOI
|