1 |
A. Schiper, K. Birman, P. Stephenson, 'Lightweight Causal and Atomic Group Multicast,' ACM Trans. on Computer Systems, Vol.9, No.3, August, 1991
DOI
|
2 |
M. Burmester and Y. G. Desmedt, 'Efficient and secure conference-key distribution,' In Security Protocols Workshop, 1996
|
3 |
Lakshminath R. Dondeti, Sarit Mukherjee, 'A Dual Encryption Protocol for Scalable Secure Multicasting,' Proceedings of IEEE International Symposium on Computer Communication, June, 1999
DOI
|
4 |
Suvo Mittra, 'Iolus : A Framework for Scalable Secure Multicasting,' In Proceedings of ACM SIGCOMM '97, Sept., 1997
DOI
|
5 |
Alain Pannetrat, Refik Molva, 'Scalable Multicast Security with Dynamic Recipient Groups,' ACM transactions on Information and System security, Vol.3, No.3, pp.136-160, August, 2000
DOI
|
6 |
Eric Harder, Samir Koussih, Sanjeev Setia, Sushil Ja-jodia, 'Kronos : A Scalable Group Re-keying Approach for Secure Multicast,' Proceeding of 2000 IEEE Symposium on Security & Privacy, 2000
|
7 |
D. M. Wallner, E. G. Harder and R. C. Agee. 'Key Management for Multicast : Issues and Architecture,' Internet Draft, draft-wallner-key-arch-01.txt September, 1998
|
8 |
Chung Kei Wong, Mohamed Gouda, Simon S. Lam, 'Secure Group Communications Using Key Graphs,' In Proceedings of ACM SIGCOMM '98, Sept., 1998
|
9 |
Gene Tsudik, Michael Steiner, Michael Waidner, 'CLIQUES : A New Approach to Group Key Agreement,' In Proceedings of ICDCS '98, May, 1998
DOI
|