Journal of Engineering and Applied Sciences

Year: 2012
Volume: 7
Issue: 3
Page No. 285 - 289

An Optimal and Cost Effective Key Management Scheme for Secure Multicast Communication

Authors : J.K. Sridhar, R. Senthil Kumar and S. Arun Kumar

References

Canetti, R. and B. Pinkas, 1999. A taxonomy of multicast security issues. IETF Internet Draft (Work in Progress), April 1999.

Canetti, R., P.C. Cheng, D. Pendarakis, J.R. Rao, P. Rohatgi and D. Saha, 1999. An architecture for secure internet multicast. http://www.securemulticast.org/smug2-rohatgi.pdf.

Chang, I., R. Engel, D. Kandlur, D. Pendarakis and D. Saha, 1999. Key management for secure internet multicast using boolean function minimization techniques. Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies, March 21-25, 1999, New York, USA., pp: 689-98.

Hardjono, T., R. Canetti, M. Baugher and P. Dinsmore, 1999. Secure IP multicast: Problem areas, framework and building blocks. http://www.securemulticast.org/msec-bof-4-Baugher-FrameworkPDF.PDF.

Moyer, M.J., J.R. Rao and P. Rohatgi, 1999. A survey of security issues in multicast communications. IEEE Network, 13: 12-23.
CrossRef  |  Direct Link  |  

Wong, C.K., M. Gouda and S.S. Lam, 2000. Secure group communication using key graphs. IEEE/ACM Trans. Networking, 8: 16-30.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved