|
[Ballardie96]A. Ballardie, “Scalable Multicast Key Distribution,” Internet RFC 1949, May 1996. [Ballardie95]A. J. Ballardie, “Core Based Trees (CBT) Multicast: Architectural Overview,” , June 20, 1995. [Cain96]Brad Cain, Ajit Thyagarajan, and Steve Deering, “Internet Group Management Protocol, Version 3,” , Expires March 8, 1996. [Burmester94]Burmester, M., and Desmedt, Y., “A Secure and Efficient Conference Key Distribution System,” Proceedings of EUROCRYPT '94, pp. 275 — 286, 1994. [Deering89]Steve Deering, “Host Extensions for IP Multicasting,” Internet RFC 1112, August 1989. [Deering95a]S. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, and L. Wei, “Protocol-Independent Multicast (PIM): Motivation and Architecture,” , January 11, 1995. [Deering95b]S. Deering, D. Estrin, D. Farinacci, V. Jacobson, C. Liu, L. Wei, P. Sharma, and A Helmy, “Protocol-Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification,” , September 7, 1995. [Estrin96]D. Estrin, D. Farinacci, V. Jacobson, C. Liu, L. Wei, P. Sharma, and A. Helmy, “Protocol-Independent Multicast (PIM), Dense-Mode Protocol Specification”, , January 17, 1996. [Fenner96]William Fenner, “Internet Group Management Protocol, Version 2,” , Expires April 1996. [Gong95]Li Gong and Nachum Shacham, “Trade-offs in Routing Private Multicast Traffic,” Global Telecommunications Conference, IEEE GLOBECOM '95, Volume: 3, Page(s): 2124 -2128, 1995. [Hardjono98]Thomas Hardjono, Brad Cain, “Secure and Scalable Inter-Domain Group Key management for N-to-N Multicast,” Proceedings. 1998 International Conference on Parallel and Distributed Systems, Pages: 478 — 485, 1998. [Harney97a]H. Harney, C. Muckenhirn, “Group Key Management Protocol (GKMP) Specification,” Internet RFC 2093, July 1997. [Harney97b]H. Harney, C. Muckenhirn, “Group Key Management Protocol (GKMP) Architecture,” Internet RFC 2094, July 1997. [Maufer97]Maufer, Tomas A., Deploying IP Multicast in the Enterprise, Prentice Hall, December 1997. [Moy94]John Moy, “Multicast Extensions to OSPF,” Internet RFC 1584, March 1994. [Nakamura90]H. Nakamura, K. Takagi, K. Okada, Y. Matsushita, “Hierarchical Group Oriented Key Management method HGK,” Proceedings of the Sixth Annual Computer Security Applications Conference on Pages: 44 — 49, 1990. [Oppliger96a]R. Oppliger, and A. Albanese, “Distributed registration and key distribution (DiRK),” Proceedings of the 12th International Conference on Information Security (IFIP SEC '96), Island of Samos (Greece), Chapman & Hall, London, pp. 199 — 208, May 21 - 24, 1996. [Oppliger96b]R. Oppliger, M. Bracher, and A. Albanese, “Distributed registration and key distribution for online universities,” Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security (CMS '96), Chapman & Hall, Essen (Germany), September 23 - 24, 1996. [Oppliger96c]R. Oppliger, “Participants Registration, Validation, and Key Distribution for MBone Conferencing,” Swiss Computer Science Conference (SCSC '96), Zürich (Switzerland), October 22 - 23, 1996. [Oppliger97]Rolf Oppliger, Andres Albanese, “Participant registration, validation, and key distribution for large-scale conferencing systems,” IEEE Communications Magazine, vol. 35, pp. -, June 1997. [Perrig99]Adrian Perrig, “Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication,” Accepted by International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC ’99), 1999. [Semeria]Chuck Semeria, Tom Maufer, “Introduction to IP Multicast Routing,” http://www.3com.com/nsc/501303s.html [Sun98]Hung-Min Sun, Shiuh-Pyng Shieh, “Secure broadcasting in large networks,” Computer Communications, Vol: 21, Issue: 3, pp. 279-283, March 25, 1998. [Waitzman88]D. Waitzman, C. Partridge, and S. Deering, “Distance Vector Multicast Routing Protocol,” Internet RFC 1075, November 1988. [Wong98]Chung Kei Wong, Mohamed Gouda, Simon S. Lam, “Secure Group Communications Using Key Graphs,” Proceedings of ACM SIGCOMM’98, ACM, September, 1998.
|