INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Judge, P., M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. – Network, IEEE, Vol. 17, 2003, pp. 30-36.10.1109/MNET.2003.1174175Search in Google Scholar

2. Challal, Y., H. Seba. Group Key Management Protocols: A Novel Taxonomy. – Enformatika, International Journal of Information Technology, Vol. 2, 2005.Search in Google Scholar

3. Bibo, J., H. Xiulin. A Survey of Group Key Management. – In: Computer Science and Software Engineering, 2008 International Conference on, 2008, pp. 994-1002.Search in Google Scholar

4. Rafaeli, S., D. Hutchison. A Survey of Key Management for Secure Group Communication. – ACM Computing Surveys, Vol. 35, September 2003, pp. 309-329.10.1145/937503.937506Search in Google Scholar

5. Chiou, G. H., W. T. Chen. Secure Broadcast Using Secure Lock. – IEEE Transactions on Software Engineering, Vol. 15, August 1989, No 8, pp. 929-934.10.1109/32.31350Search in Google Scholar

6. Harney, H., C. Muckenhirn. Group Key Management Protocol (GKMP) Architecture, July 1997. – In: RFC 2093.10.17487/rfc2094Search in Google Scholar

7. Harney, H., C. Muckenhirn. Group Key Management Protocol (GKMP) Specification, July 1997. – In: RFC 2094.10.17487/rfc2093Search in Google Scholar

8. Wallner, D., E. Harder, R. Agee. Key Management for Multicast: Issues and Architecture. National Security Agency, June 1999. – In: RFC 2627.10.17487/rfc2627Search in Google Scholar

9. Wong, C. K., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. – In: Proc. of ACM SIGCOMM, 1998.10.1145/285237.285260Search in Google Scholar

10. Wong, C. K., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. – IEEE/ACM Transactions on Networking, Vol. 8, February 2000, No 1, pp. 16-30.10.1109/90.836475Search in Google Scholar

11. Balenson, D., D. Mc Grew, A. Sherman. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. Draft-balenson-groupkeymgmtoft-00.txt, February 1999. Internet-Draft.Search in Google Scholar

12. Canetti, R., J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas. Multicast Security: A Taxonomy and Efficient Constructions. – In: Proc. of IEEE INFOCOM, March 1999, pp. 708-716.10.1109/INFCOM.1999.751457Search in Google Scholar

13. Mc Grew, D. A., A. T. Sherma. Key Establishement in Large Dynamic Groups Using One-Way Function Trees. Technical Report TR-0755, World Academy of Science Engeneering and Technology, May 1998.Search in Google Scholar

14. Waldvogel, M., G. Caronni, D. Sun, N. Weiler, B. Plattner. The VersaKey Framework: Versatile Group Key Management. – IEEE Journal on Selected Areas in Communications (Special Issues on Middleware), Vol. 17, August 1999, No 8, pp. 1614-1631.10.1109/49.790485Search in Google Scholar

15. Ballardie, A. Scalable Multicast Key Distribution. May 1996. – In: RFC 1949.10.17487/rfc1949Search in Google Scholar

16. Ballardie, A. Core Based Trees (CBT Version 2) Multicast Routing Protocol Specification, September 1997. – In: RFC 2189.10.17487/rfc2189Search in Google Scholar

17. Ballardie, T., I. P. Francis, J. Crowcroft. Core Based Trees: An Architecture for Scalable Inter-Domain Multicast Routing. – In: Proc. of ACM SIGCOMM, 1993, pp. 85-95.Search in Google Scholar

18. DeCleene, B., L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, C. Zhang. Secure Group Communications for Wireless Networks. MILCOM, June 2001.Search in Google Scholar

19. Hardjono, T., B. Cain, I. Monga. Intra-Domain Group Key Management for Multicast Security. IETF Internet Draft, September 2000.Search in Google Scholar

20. Rafaeli, S., D. Hutchison. Hydra: A Decentralized Group Key Management. – In: 11th IEEE International WETICE: Enterprise Security Workshop, June 2002.10.5753/sbseg.2002.21272Search in Google Scholar

21. Setia, S., S. Koussih, S. Jajodia, E. Harder. Kronos: Ascalable Group Re-Keying Approach for Secure Multicast. – In: IEEE Symposium on Security and Privacy, May 2000.Search in Google Scholar

22. Briscoe, B. MARKS: Multicast Key Management Using Arbitrarily Revealed Key Sequences. – In: 1st International Workshop on Networked Group Communication, November 1999.10.1007/978-3-540-46703-8_19Search in Google Scholar

23. Dondeti, L. R., S. Mukherjee, A. Samal. Scalable Secure One-to-Many Group Communication Using Dual Encryption. – Computer Communications, Vol. 23, November 2000, No 17, pp. 1681-1701.10.1016/S0140-3664(00)00255-3Search in Google Scholar

24. Dondeti, L. R., S. Mukherjee, A. Samal. Comparison of Hierarchical Key Distribution Schemes. – In: IEEE Globcom Global Internet Symposium, 1999.Search in Google Scholar

25. Ingemarson, D. Tang, C. Wong. A Conference Key Distribution System. – IEEE Transactions on Information Theory, Vol. 28, September 1982, No 5, pp. 714-720.10.1109/TIT.1982.1056542Search in Google Scholar

26. Steiner, M., G. Tsudik, M. Waidner. Diffie-Hellman Key Distribution Extended to Group Communication. – In: 3rd ACM Conference on Computer and Communications Security, March 1996, pp. 31-37.10.1145/238168.238182Search in Google Scholar

27. Diffie, W., M. E. Hellman. New Directions in Cryptography. – IEEE Transactions on Information Theory, Vol. IT-22, November 1976, pp. 644-654.10.1109/TIT.1976.1055638Search in Google Scholar

28. Becker, C., U. Wille. Communication Complexity of Group Key Distribution. – In: 5th ACM Conference on Computerand Communications Security, Nowember 1998.10.1145/288090.288094Search in Google Scholar

29. Kim, Y., A. Perrig, G. Tsudik. Communication-Efficient Group Key Agreement. – In: Proc. of IFIP SEC, June 2001.10.1007/0-306-46998-7_16Search in Google Scholar

30. Rodeh, O., K. Birman, D. Dolev. Optimized Group Rekey for Group Communication Systems. – Network and Distributed System Security, February 2000.Search in Google Scholar

31. Dondeti, L., S. Mukherjee, A. Samal. A Distributed Group Key Management Scheme for Secure Many-to-Many Communication. Technical Report PINTL-TR-207-99, 1999.Search in Google Scholar

32. Fiat, A., M. Naor. Broadcast Encryption. – In: CRYPTO’93, 1993, LNCS(773), pp. 480-491.10.1007/3-540-48329-2_40Search in Google Scholar

33. Boyd, C. On Key Agreement and Conference Key Agreement. – In: Information Security and Privacy: Australasian Conference, 1997, LNCS(1270), pp. 294-302.Search in Google Scholar

34. Burmester, M., Y. Desmedt. A Secure and Efficient Conference Key Distribution System. – In: EUROCRYP’94, 1994, LNCS(950), pp. 275-286.10.1007/BFb0053443Search in Google Scholar

35. Yan, S., W. Trappe, K. J. R. Liu. An Efficient Key Management Scheme for Secure Wireless Multicast. – In: ICC’02. Communications, 2002, IEEE International Conference on, Vol. 2, 2002, pp. 1236-1240.10.1109/ICC.2002.997047Search in Google Scholar

36. Yan, S., W. Trappe, K. J. R. Liu. Topology-Aware Key Management Schemes for Wireless Multicast. – In: Global Telecommunications Conference, 2003. GLOBECOM’03, Vol. 3, IEEE, 2003, pp. 1471-1475.Search in Google Scholar

37. Lin, L., L. Xueming, C. Yong. HKM: A Hybrid Key Management Scheme for Secure Mobile Multicast. – In: Networking, Architecture, and Storage, 2007. NAS’2007. International Conference on, pp. 109-114.10.1109/NAS.2007.27Search in Google Scholar

38. Yiling, W., L. Phu Dung, B. Srinivasan. Hybrid Group Key Management Scheme for Secure Wireless Multicast. – In: Computer and Information Science, 2007. ICIS’2007. 6th IEEE/ACIS International Conference on, 2007, pp. 346-351.Search in Google Scholar

39. Yiling, W., L. Phu Dung, B. Srinivasan. Efficient Key Management for Secure Wireless Multicast. – In: 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT’08), 2008., pp. 1131-1136.Search in Google Scholar

40. Eidkhani, E., M. Hajyvahabzadeh, S. A. Mortazav, A. N. Pour. CRAW: Combination of Re-Keying and Authentication in Wireless Networks for Secure Multicast Increasing Efficiency of Member Join/Leave and Movement. – International Journal of Computer Networks & Communications (IJCNC), Vol. 4, 2012, pp. 107-128.10.5121/ijcnc.2012.4407Search in Google Scholar

41. Sandirigama, M., S. Akihiro, M. Noda. Simple and Secure Password Authentication Protocol. – IEICE Trans. Com., Vol. E83-B, 2000, pp. 1363-1365.Search in Google Scholar

42. Hajyvahabzadeh, M., E. Eidkhani, S. A. Mortazavi, A. N. Pour. A New Group Key Management Protocol Using Code for Key Calculation: CKC. – In: International Conference on Information Science and Applications (ICISA’10), 2010, pp. 1-6.Search in Google Scholar

43. Ming-Chin, C., L. Jeng-Farn. MKMS: Multicast Key Management Scheme for Proxy Mobile IPv6 Networks. – In: International Conference on Consumer Electronics, Communications and Networks (CECNet’11), 2011, pp. 1402-1405.Search in Google Scholar

44. Jianfeng, G., Z. Huachun, Z. Hongke, H. Luo. Multicast Extension Support for Proxy MIPv6. – In: Consumer Communications and Networking Conference (CCNC’10), 7th IEEE, 2010, pp. 1-5.Search in Google Scholar

45. Gundavelli, S., K. Leung, V. Devarapalli, K. Chowdhury, B. Patil. Proxy Mobile IPv6. RFC 5213, August 2008.Search in Google Scholar

46. Kellil, M., J. C. A. Olivereau, P. Janneteau. Rekeying in Secure Mobile Multicast Communications. United States Patent Application Publications, US 2007/0143600 A1 2007.Search in Google Scholar

47. Kiah, L. M., K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. – In: Future Generation Communication and Networking (FGCN’07), 2007, pp. 100-107.10.1109/FGCN.2007.144Search in Google Scholar

48. Kiah, M. L. M., K. M. Martin. Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments. – International Journal of Security and its Applications, Vol. 2, January 2008, pp. 39-52.10.1109/FGCN.2007.144Search in Google Scholar

49. Kiah, M. L. M., B. Daghighi. An Implementation of Secure Group Communication in a Wireless Environment. – International Journal of Computer and Electrical Engineering, Vol. 4, December 2012.10.7763/IJCEE.2012.V4.618Search in Google Scholar

50. Gharout, S., A. Bouabdallah, M. Kellil, Y. Challal. Key Management with Host Mobility in Dynamic Groups. – In: Proc. of 3rd International Conference on Security of Information and Networks, Taganrog, Rostov-on-Don, Russian Federation, 2010.10.1145/1854099.1854138Search in Google Scholar

51. Gharout, S., A. Bouabdallah, Y. Challal, M. Achemlal. Adaptive Group Key Management Protocol for Wireless Communications. – j-jucs, Vol. 18, May 2012, pp. 874-898.Search in Google Scholar

52. Chung Kei, W., M. Gouda, S. S. Lam. Secure Group Communications Using Key Graphs. –IEEE/ACM Transactions on Networking, Vol. 8, 2000, pp. 16-30.10.1109/90.836475Search in Google Scholar

53. Mapoka, Trust Tshepo. Group Key Management Protocols for Secure Mobile Multicast Communication: A Comprehensive Survey. – International Journal of Computer Applications, Vol. 84, 2013, pp. 28-38.10.5120/14629-2985Search in Google Scholar

54. Zhao, S., R. Kent, A. Aggarwal. A Key Management and Secure Routing Integrated Framework for Mobile Ad Hoc Networks. – Ad Hoc Networks, Vol. 11, 2013, pp. 1046-1061.10.1016/j.adhoc.2012.11.005Search in Google Scholar

55. Abouhogail, Reham Abdellatif. Security Assessment for Key Management in Mobile Ad Hoc Networks. – International Journal of Security and Its Applications, Vol. 8, 2014, No 1, pp. 169-182.10.14257/ijsia.2014.8.1.16Search in Google Scholar

eISSN:
1314-4081
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology