1 |
C. K. Wong, M. Gouda, and S. S. Lam, 'Secure group communications using key graphs,' In Proceedings of ACM SIGCOMM, 1998
|
2 |
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, 'Multicast Security: A Taxonomy and Efficient Authentication,' In Proc. of IEEE '99, vol.2, pp.708-716, March 1999
|
3 |
A. Perrig, D. Song, J.D.Tygar, 'ELK, a New Protocol for Efficient Large-Group Key Distribution,' In 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2001
|
4 |
Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park, 'Efficient Multicast Key Management for Stateless Receivers,' ICISC 2002: 497-509
|
5 |
X. S. Li, Y. R. Yang, M. G. Gouda, S. S. Lam, 'Batch Rekeying for Secure Group Communications,' WWW10, 2001
|
6 |
A. T. Sherman and D. A. McGrew, 'Key Establishment in Large Dynamic Groups Using One-Way Function Trees,' IEEE Transactions on software engineering, Vol. 29, 2003
|
7 |
S. E. Deering, 'Multicast routing in internetworks and extended LANs,' In Proceedings of ACM SIGCOMM, pp. 55-64, 1988
|
8 |
A. T. Sherman and D. A. McGrew, 'Key Establishment in Large Dynamic Groups Using One-Way Function Trees,' Cryptographic Technologies Group TIS Labs at Network Associates, 1998
|
9 |
H. Harney and E. Harder, 'Logical key hierarchy protocol,' IETF Internet Draft, 1999
|
10 |
D. Wallner E. Harder, and R. Agee, 'Key Management for Multicast : Issues and Architectures,' IETF RFC 2627, 1999
|
11 |
S. Rafaeli, L. Mathy, and D. Hutchison, 'EHBT: An efficient protocol for group key management,' Lecture Notes in Computer Science, 2233: 159-171, 2001
|
12 |
D. Naor, M. Naor, J. Lotspiech, 'Revocation and Tracing Schemes for Stateless Receivers,' Lecture Notes in Computer Science 2139, pp. 41-62, 2001
|