1 |
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, 'Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques,' Proceedings of Infocom, New York, March, 1999
DOI
|
2 |
C. K. Wong, M. Gouda, S. S. Lam, 'Secure Group Communications using Key Graphs,' Proceedings of ACM SIGCOMM, Vancouver, British Columbia, Sep., 1998
DOI
|
3 |
S. Banerjee, B. Bhattacharjee, 'Scalable secure Group Communication over IP Multicast,' Proceedgins of ICNP, Nov., 2001
|
4 |
M. Steiner, G. Tsudik, M .Waidner, 'Key Agreement in Dynamic Peer Groups,' IEEE Tr. on Parallel and Distributed Systems, Vol.11, No.8, pp.769-780, 2000
DOI
ScienceOn
|
5 |
X. S. Li, Y. R. Yang, M. G. Gouda, S. S. Lam, 'Batch Rekeuing for Secure Group Communications,' WWW10, May, 2001
|
6 |
J. F. Wakerly, 'Digital Design Principles and Practices,' Prentice-Hall, 1990
|
7 |
http://www.nist.gov/dads/HTML/hammingdist.html
|
8 |
W. Diffie and M. Hellman, 'New Directions in Cryptography,' IEEE Tr. on Information Theory, IT-22, pp.644-654, Nov., 1976
DOI
|
9 |
A. Ballardie, 'Scalable Multicast Key Distribution,' RFC 1949, May, 1996
|
10 |
T. Hardjono, G. Tsudik, 'IP Multicast Security : Issues and Directions,' Annales De Telecom, pp.324-340, July-August, 2000
|
11 |
D. Wallner, E. Harder, R. Agee, 'Key Management for Multicast : Issues and Architectures,' RFC 2627, 1999
|