1 |
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure Group Communications Using Key Graphs," ACM SIGCOMM, pp.68-79, 1998
|
2 |
A. Perrig, D. Song, and J. D. Tygar. "ELK, a New Protocol for Efficient Large-Group Key Distribution," Proceedings of IEEE Symposium on Security and Privacy, pp.247-262, 2001
|
3 |
Y. Tsiounis, M. Yung, "On the Security of ElGamal Based Encryption," Proceedings of the 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Lecture Notes in Computer Science 1431, pp.117-134, 1998
DOI
|
4 |
T. M. Cover, J. A. Thomas, Elements of Information Theory (second edition), Wiley, 2006
|
5 |
A. Ivan, Y. Dodis, "Proxy Cryptography Revisited," Proceedings of the Tenth Network and Distributed System Security Symposium, 2003
|
6 |
M. Steiner, G. Tsudik, M. Waidner, "Diffie-Hellman Key Distribution Extended to Group Communication," Proceedings of the 3rd ACM Conference on Computer and Communications Security (ACM CCS), pp.31-37, 1996
|
7 |
D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proceedings of Crypto 2001, Lecture Notes in Computer Science 2139, pp.
213-229, 2001
DOI
|
8 |
C. Huang, Y. Chiu, K. Chen, C. Lei, "Secure Multicast in Dynamic Environments," Computer Networks, vol.51, pp.2805-2817, 2007
DOI
ScienceOn
|
9 |
R. Molva, A. Pannetrat, "Scalable Multicast Scemity in Dynamic Groups," Proceedings of the 6th ACM Conference on Computer and Communications Security (ACM CCS), pp.101-112, 1999
|
10 |
I. F. Akyildiz, X. Wang, W. Wang, "Wireless Mesh Networks: A Survey, Computer Networks," vol.47, pp.445~487, 2005
DOI
ScienceOn
|
11 |
L. Dondeti, S. Mukherjee, A. Samal, "Scalable Secure One-to-many Group Communication Using Dual Encryption," Computer Communication, vol.
23, pp.1681-1701, 1999
DOI
ScienceOn
|
12 |
D. A. McGrew and A. T. Sherman, "Key Establishment in Large Dynamic Groups Using Oneway Function Trees," Tech. Rep. 0755, TIS Labs at Network Associates, Inc., Glenwood, Md
|
13 |
R. Cramer, V. Shoup, "Secure Hybrid Encryption from Weakened Key Encapsulation," Proceedings of Crypto, pp.553-571, 2007
|
14 |
R Canetti, J. Garay, G. Itkis, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," Proceedings of IEEE INFOCOM 1999, pp.708-716
|
15 |
Y. Chiu, C. Lei, C. Huang, "Secure Multicast Using Proxy Encryption," Proceedings of International Conference on Information and Communications Security, ICIGS 2005, Lecture Notes in Computer Science 3783, pp.280-290, 2005
|
16 |
D. R. Stinson, Cryptography Theory and Practice (third edition), Chapman & Hall/CRC, 2006
|
17 |
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.277-288, 1997
|
18 |
S. Rafaeli, D. Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, vol.35, no.3, pp.309-329, 2003
DOI
ScienceOn
|