Journal of Engineering and Applied Sciences
Year:
2012
Volume:
7
Issue:
3
Page No.
285 - 289
References
Canetti, R. and B. Pinkas, 1999. A taxonomy of multicast security issues. IETF Internet Draft (Work in Progress), April 1999.
Canetti, R., P.C. Cheng, D. Pendarakis, J.R. Rao, P. Rohatgi and D. Saha, 1999. An architecture for secure internet multicast. http://www.securemulticast.org/smug2-rohatgi.pdf.
Chang, I., R. Engel, D. Kandlur, D. Pendarakis and D. Saha, 1999. Key management for secure internet multicast using boolean function minimization techniques. Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies, March 21-25, 1999, New York, USA., pp: 689-98.
Hardjono, T., R. Canetti, M. Baugher and P. Dinsmore, 1999. Secure IP multicast: Problem areas, framework and building blocks. http://www.securemulticast.org/msec-bof-4-Baugher-FrameworkPDF.PDF.
Moyer, M.J., J.R. Rao and P. Rohatgi, 1999. A survey of security issues in multicast communications. IEEE Network, 13: 12-23.
CrossRef | Direct Link | Wong, C.K., M. Gouda and S.S. Lam, 2000. Secure group communication using key graphs. IEEE/ACM Trans. Networking, 8: 16-30.
CrossRef | Direct Link |