|
[1] Mohamed Eltoweissy, M. Hossain Heydari, Linda Morales and I. Hal Sudborough, “Combinatorial Optimization of Group Key Management,” Journal of Network and Systems Management, Vol. 12, No. 1, March 2004. [2] Yan Sun, Wade Trappe, and K. J. Ray Liu, “A Scalable Multicast Key Management Scheme for Heterogeneous Wireless Networks,” IEEE/ACM TRANSACTIONS ON NETWORKING, Vol. 12, NO. 4, AUGUST 2004. [3] SANDRO RAFAELI AND DAVID HUTCHISON, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, Vol. 35, No. 3, pp. 309–329, September 2003. [4] Jyh-How Huang and Shivakant Mishra, “Support for Mobility and Fault Tolerance in Mykil,” Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN’04), 2004. [5] Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabdallah, “SAKM: A Scalable and Adaptive Key Management Approach for Multicast Communications,” ACM SIGCOMM Computer Communications Review , Vol 34, No. 2, April 2004. [6] R. Canetti, J. Garay, G. Itkis, D. Miccianancio, M. Naor and B. Pinkas, “Multicast security: A taxonomy and some efficient constructions,” in Proc. IEEE INFOCOM, Vol. 2, pp. 708–716, March 1999. [7] M. J. Moyer, J. R. Rao and P. Rohatgi, “A survey of security issues in multicast communications,” IEEE Network, Vol. 13, pp. 12–23, Nov.–Dec. 1999. [8] W. Trappe, J. Song, R. Poovendran and K. J. R. Liu, “Key distribution for secure multimedia multicasts via data embedding,” in Proc. IEEE ICASSP, pp. 1449–1452, May 2001,. [9] M. Waldvogel, G. Caronni, D. Sun, N. Weiler and B. Plattner, “The VersaKey framework: Versatile group key management,” IEEE J. Select. Areas Commun, Vol. 17, pp. 1614–1631, September 1999. [10] A. Ballardie, “Scalable multicast key distribution,” RFC 1949, May 1996. [11] S. Mitra, “Iolus: A framework for scalable secure multicasting,” Proceedings of ACM SIGCOMM ’97, pp. 277–288, 1997. [12] D. M. Wallner, E. J. Harder and R. C. Agee, “Key management for multicast: Issues and architectures,” Informational RFC, draft-wallner-key-arch-00.txt, July 1997. [13] H. Harney and C. Muckenhirn, “Group Key Management Protocol (GKMP) Specification”, RFC 2093, July 1997. [14] H. Harney and E. Harder, “Group secure association key management protocol,” draft-harney-spartagsakmp-sec-000.txt, April 1997. [15] R. Canetti and B. Pinkas, “A taxonomy of multicast security issues, “ Internet Draft, May 1998. [16] DANILO BRUSCHI and EMILIA ROSTI, “Secure Multicast inWireless Networks of Mobile Hosts:Protocols and Issues,” Mobile Networks and Applications Vol7, pp. 503–511, 2002. [17] Isabella Chang, Robert, Engel, Dilip Kandlur, Dimitnos Pendarakis and Debanjan Saha, “Key management for secure lnternet multicast using Boolean function minimization techniques,” Journal of Network and Systems Management, Vol. 12, No. 1, March 2004.
|