A Study of Secure Group Key Management Based on Key-Chain for Multicast Data Transmission |
Kim, Bo-Seung
(Dept of computer Science, Soongsil University)
Kim, Jeong-Jai (Dept of computer Science, Soongsil University) Lee, Ki-Young (S.Net Systems Inc.) Shin, Yong-Tae (Dept of computer Science, Soongsil University) |
1 | Alan T. Sherman and David A. McGrew, "Key Establishment in Large Dynamic Groups using One Way Function Trees," IEEE Trans. on Software Engineering, Vol.29, No.5, pp. 444-458, 2003. DOI |
2 | T. Hardjono, "Key Management Framework for IP Multicast Infrastructure Security," IS&N99, LNCS 1597, 1999. |
3 | 임효준, 김종권, "계층 비디오 멀티캐스트를 위한 효율적인 키 분배 방법", 정보과학회 논문지, 제27권 4호, pp. 476-481, 2000. 과학기술학회마을 |
4 | 홍종준, "PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계", 한국 인터넷 정보학회 논문지, 제3권 5호, pp. 87-94, 2002. 과학기술학회마을 |
5 | Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. and Pinkas, B., "Multicast security: a taxonomy and some efficient constructions," IEEE INFOCOM 99, pp. 708-716, 1999. |
6 | D. Kosiur, IP Multicasting : The Completer Guide to Interactive Corporate Networks, John Wiley & Sons, Inc., 1998. |
7 | Moyer MJ, Rao JR, Rohatgi P., "A Survey of Security Issues in Multicast Communications," IEEE Network, V.13 N.6, pp. 12-23, 1999. DOI |
8 | Perring, A., Song, D., Canetti, R., Tygar J. D., Briscoe, B., "Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction," RFC 4082,June 2005. |
9 | H.Harney and C. Muckenhirn, "Group Key Management Protocol(GKMP) Specification,", Request for Comments 2093, July 1997. |