1 |
박희운, 이임영, '효율적인 회의용 키 분배 방식에 관한 연구', 한국통신정보보호학회 충청지부, 1999
|
2 |
김봉한, 이명선, 이재광, 'Mbone 구현을 위한 IP멀티캐스트 라우팅 프로토콜', 정보처리학회지, Vol.6, No.4, 1999
과학기술학회마을
|
3 |
T. Dunigan and C. Cao. Group Key Management. Technical Report ORNL/TM-13470. 1998
|
4 |
A. Ballardie, 'Core Based Tree(CBT)Multicast Routing Architecture,' Request for Comments2201, Internet Activities Board, Oct., 1997
|
5 |
C. Perkins, 'IP mobility support,' RFC 2002
|
6 |
D.A.McGrew and A.T.Sherman, 'Key Establishment in Large Dynamic Groups: Using One-Way Function Trees,' Technical Report 0755, TIS Labs, 1998
|
7 |
H. Harney and C. Muckenhirn, 'Group Management Protocol(GKMP) Architecture,' IETF RFC 2094, 1997
|
8 |
A. Aziz, T. Markson and Prafullchandra, 'Simple Key-Management Internet Protocols(SKIP),' IETF fraipsec-skip-03.txt, Oct., 1995
|
9 |
M. Moyer, J. Rao and P. Rohatgi, 'A Survey of Security Issues in Multicast Communications,' IEEE Network, Nov/Dec, 1999
DOI
ScienceOn
|
10 |
K. Matsuura, Y. Zheng and H. Imai, 'Compact and Flexible Resolution of CBT Multicast Key-Distribution,' WWCA98, 1998
|
11 |
R. Poovendram, S. Ahmed, S. Corson, and J. Baras. A Scalable Extension of Group Key Management Protocol. 2nd Annual ATRIP Conference, pp.187.191, February, 1998
|
12 |
D.A.McGrew and A.T.Sherman, 'Key Establishment in Large Dynamic Groups: Using One-Way Function Trees,' Technical Report 0755, TIS Labs, 1998
|
13 |
A. Ballardie, 'Scalable Multicast Key Distribution,' RFC1949, May, 1996
|
14 |
R. Poovendram, S. Ahmed, S. Corson, and J. Baras. A Scalable Extension of Group Key Management Protocol. 2nd Annual ATRIP Conference, pp.187.191, February, 1998
|
15 |
Guang-huei Chiou, Wen-Tsuen Chen, 'Secure Broad-casting Using the Secure Lock,' IEEE Transactions on Software Engineering, Vol.15, Issue 8, pp.929-934, 1989
DOI
ScienceOn
|
16 |
E. Brickell, P. Lee and Y. Yacobi, 'Secure Audio teleconference,' Advances in Cryptology-Crypto '87, Lecture Notes in Computer Science 293, pp.418-42, 1988
|
17 |
H. Harney and C. Muckenhirn, 'Group key management protocol (GKMP) architecture,' RFC 2094
|
18 |
T. Dunigan and C. Cao. Group Key Management. Technical Report ORNL/TM-13470, 1998
|
19 |
Y. Yacobi, 'Attack on the Koyama-Otha Identity-based key distribution systems,' Proceedings of Cryto'87, Lecture Notes in Computer Science no. 293, Springer-Verlag, pp.429-433, 1998
|
20 |
K. Koyama and K. Ohta, 'Identity-based conference key distribution systems,' Proceedings of Crypto '87, lecture Notes in Computer Science no. 293, Springer-Verlag, pp.175-184, 1988
|
21 |
W. Diffie and M. Hellan, 'New Direction in cryptography,' IEEE Trans, IT-22, pp.644-654, 1976
DOI
|
22 |
I. Ingemarsson, D. Tang and C. Wong, 'A Conference key distribution system,' IEEE Trans., It-28, pp.714-720, 1982
DOI
|
23 |
M. Burmester and Y. Desmedt, 'A Secure and Efficient Conference Key Distribution Systems,' EUROCRYPT '94, pp.279-290
|