|
[1]. Chung Kei Wong, Gouda, M., and Lam, S.S., ²Secure Group Communications Using Key Graphs,² IEEE/ACM Transactions on Networking, Vol. 8, No. 1, Feb. 2000, pp. 16-30. [2]. Al Shahri, A.F., Smith, D.G., and Irvine, J.M., ²A secure network access protocol (SNAP),² 18th IEEE International Symposium on Computers and Communication, 30 June-3 July 2003, pp. 809-814. [3]. Naor, M., and Wool, A., ²Access Control and Signatures via Quorum Secret Sharing,² IEEE Transactions on Parallel and Distributed Systems, Vol. 9, No. 9, Sept. 1998, pp. 909-922. [4]. Sandro Rafaeli, David Hutchison, ²A survey of key management for secure group communication,² ACM Computing Surveys (CSUR), Vol. 35, No. 3, Sept. 2003, pp. 309-329. [5]. Suvo Mittra, ²Iolus: a framework for scalable secure multicasting,² ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, Sept. 1997, pp. 277-288. [6]. Kumar, A., ²Hierarchical quorum consensus: a new algorithm for managing replicated data,² IEEE Transactions on Computers, Vol. 40, No. 9, Sept. 1991, pp. 996-1004. [7]. Adi Shamir, ²How to share a secret,² Communications of the ACM, Vol. 22, No. 11, Nov. 1979, pp. 612-613. [8]. Canetti, R., Malkin, T., and Nissim, K., ²Efficient communication-storage tradeoffs for multicast encryption,² Cryptology---EUROCRYPT '99, J. Stem, Ed. Lectures Notes in Computer Science, Vol. 1599, pp. 459-474. [9]. Li, M., Poovendran, R., and Berenstein, C., ²Optimization of key storage for secure multicast,² 35th Annual Conference on Information Sciences and Systems, March 2001, pp. 771-774. [10]. G.R. Blakley, ²Safeguarding Cryptographic Keys,² AFIPS,Nat’l Computer Conference, Vol. 48, 1979, pp. 313-317. [11]. S. E. Deering, ²Multicast routing in internetworks and extended LANs,² Symposium on Communications architectures and protocols, Aug. 1988, pp. 55-64. [12]. T. Ballardie, and J. Crowcroft, ²Multicast-specific security threats and counter-measures,² Symposium on Network and Distributed System Security, Feb 1995, pp. 2. [13]. McDaniel, P., Prakash, A., and Honeyman, P., ²Antigone: A flexible framework for secure group communication,² 8th USENIX Security Symposium, Aug. 1999, pp. 99-114. [14]. Yongdae Kim, Adrian Perrig, and Gene Tsudik, ²Simple and fault-tolerant key agreement for dynamic collaborative groups,² 7th ACM conference on Computer and communications security, Nov. 2000, pp. 235-244.
|