References
- McCanne, S. and Jacobson, V., 'Receiver-driven layered multicast,' ACM SIGCOMM 96, pp. 117-130, 1996 https://doi.org/10.1145/248156.248168
- Wong, C. K., Gouda, M. and Lam, S. S., 'Secure group communications using key graphs,' ACM SIGCOMM 98, pp. 68-79, 1998 https://doi.org/10.1145/285243.285260
- Mittra, S., 'Iolus: a framework for scalable secure multicasting,' ACM SIGCOM 97, pp. 277-288, 1997
- Dondeit, L. R. and Mukherjee, S., 'A dual encryption protocol for scalable secure multicasting,' IEEE International Symposium on Computers and Communications, pp. 2-8, 1999 https://doi.org/10.1109/ISCC.1999.780748
- Wallner, D., Harder, E. and Agee, R., 'Key management for multicast: issues and architectures,' IETF RFC 2627
- Harney, H. and Harder., E., 'Logical key hierarchy protocol,' IETF Internet draft
- McGrew, D. A. and Sherman, A. T., 'Key establishment in large dynamic groups using one-way function trees,' submitted to IEEE Transactions on Software Engineering https://doi.org/10.1109/TSE.2003.1199073
- Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. and Pinkas, B., 'Multicast security: a taxonomy and some efficient constructions,' IEEE INFOCOM 99, pp. 708-716, 1999 https://doi.org/10.1109/INFCOM.1999.751457
- Moyer, M. J., Rao, J. R. and Rohatgi, P., 'A survey of security issues in multicast communications,' IEEE Networks Magazine, Vol. 13, No. 6, pp. 12-23, 1999 https://doi.org/10.1109/65.806981
- 이인영, 곽재창, '다자간 원격 회의시스템에서 보안을 위한 효율적인 그룹 키교환 방식', 정보과학회 98 가을 학술발표 논문집(III), 제25권, 제2호, pp. 500-502, 1998