References
- R. Molva, P. Michiardi, "Security in Ad hoc Networks," in Proc. of Personal Wireless Communications (PWC'03), pp. 736-775, 2003.
- Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik, "On the Performance of Group Key Agreement Protocols," in Proc.of 22nd IEEE International Conference on Distributed Computing Systems, pp. 463-464, 2002.
- Y. Kim, A. Perrig, G. Tsudik, "Communication-efficient group key agreement," in Proc. of the 16th International Conference on Information Security: Trusted Information, pp. 229-244, 2001.
- C.K. Wong, M.G. Gouda, S.S. Lam, "Secure Group Communications using Key Graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000. https://doi.org/10.1109/90.836475
- D. Wallner, E. Harder, R. Agee, "Key Management for Multicast: Issues and Architectures," RFC 2627, 1999.
- D.A. McGrew, A.T. Sherman, "Key Establishment in Large Dynamic Groups using One-way Function Trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003. https://doi.org/10.1109/TSE.2003.1199073
- A. Perrig, D. Song, D. Tygar, "ELK: A New Protocol for Efficient Large Group Key Distribution," in Proc. of the IEEE Security and Privacy, 2001.
- M. Steiner, G. Tsudik, M. Waidner, "Key Agreement in Dynamic Peer Groups," IEEE Trans. on Parelled Distributed Systems, vol. 11, no. 8, pp. 769-780, 2000. https://doi.org/10.1109/71.877936
- Y. Kim, A. Perrig, G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups," ACM Conference on Computer and Communications Security, pp. 235-244, 2000.
- L. Lazos, R. Poovendran, "Energy-aware Secure Multicast Group Communication in Mobile Networks," in Proc. of IEEE International conference on Acoustics Speech and Signal Processing, pp. 201-204, 2003.
- L. Lazos, R. Poovendran, "Location-aware Secure Wireless Multicast in Ad Hoc Networks under Heterogeneous Pathloss," in Proc. of UWEETR-2003-0012, 2003.
- J. Son, J. Lee, S. Seo, "Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks," Wireless Personal Communications, vol. 52, pp. 359-382, 2010. https://doi.org/10.1007/s11277-008-9653-4
- R.D. Pietro, L.V. Mancini, Y.W. Law, S. Etalle, P.J.M. Havinga, "LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks," in Proc. of ICPP Workshops, 2003.
- N. Asokan, P. Ginzboorg, "Key-Agreement in Ad-hoc Networks," Computer Communications, vol. 23, no. 17, pp. 1627-1637, 2000. https://doi.org/10.1016/S0140-3664(00)00249-8
- T. Chiang, Y. Huang, "Group Keys and the Multicast Security in Ad Hoc Networks," in Proc. of ICPP Workshops, pp. 385-390, 2003.
- Y. Wang, X.Y. Li, O. Frieder, "Efficient Hybrid Key Agreement Protocol for Wireless Ad Hoc Networks," in Proc. of the 11th International Conference on Computer Communications and Networks(ICCCN'02), pp. 147-151, 2002.
- I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, "Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques," in Proc. of IEEE Infocomm'99, pp. 689-698, 1999.
- R. Safavi-Naini, H. Wang, "New Constructions for Multicast Re-keying Schemes using Perfect Hash Families," in Proc. of the 7th ACM conference on Computer and communications security, pp. 228-234, 2000.
- I. Ingemarsson, D. Tang, C. Wong, "A Conference Key Distribution system," IEEE Transactions on Information Theory, vol. 28, no. 5, pp. 714-720, 1982. https://doi.org/10.1109/TIT.1982.1056542
- A. Perrig, "Efficient Collaborative Key Management Protocols for Secure Autonomous Group Communication," in Proc. of the 1999 International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC '99), pp. 192-202, 1999.
- L. Zhou, Z. Haas, "Securing Ad Hoc Networks," IEEE Networks Magazine, vol. 13, no. 6, pp. 24-30, 1999. https://doi.org/10.1109/65.806983
- S. Capkun, L. Buttyan, J.P Hubaux, "Self-Organized Public Key Management for Mobile Ad Hoc Networks," ACM International Workshop on Wireless Security, 2002.
- D. Boneh, "Twenty years of attacks on the RSA cryptosystem," Notices of the American Mathematical Society (AMS), vol. 46, No. 2, pp. 203-213, 1999.
- D. Coppersmith, "Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities," Journal of Cryptology, vol. 10, pp. 233-260, 1997. https://doi.org/10.1007/s001459900030
- J. Hastad, "Solving Simultaneous Modular Equations of Low Degree," SIAM Journal of Computing, vol. 17, pp. 336-341, 1988. https://doi.org/10.1137/0217019
- M. Burmester, Y. Desmedt, "A Secure and Efficient Conference Key Distribution System," in Proc. of Advances in Cryptology, Eurocrypt '94, pp. 275-286, 1994.
- O. Rodeh, K. Birman, D. Dolev, "The Architecture and Performance of Security Protocols in the Ensemble Group Communication System: Using Diamonds to Guard the Castle", ACM Transactions on Information System Security, vol. 4, no. 3, pp. 289-319, 2001. https://doi.org/10.1145/501978.501982
- L. Dondeti, S. Mukherjee, A. Samal, "DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication," in Proc. of the Fifth IEEE Symposium on Computers and Communications, pp. 693-698, 2000.
- Y. Kim, A. Perrig, G. Tsudik, "Tree-based Group Key Agreement," ACM Transactions on Information System Security, vol. 7, no. 1, pp. 60-96, 2004. https://doi.org/10.1145/984334.984337
- M. Baugher, R. Canetti, L. Dondeti, F. Lindholm, "Multicast Security (MSEC) Group Key Management Architecture," RFC 4046, 2005.
- B. Adamon, C. Bormann, M. Handley, J. Macker, "Negative-Acknowledgment (NACK) -Oriented Reliable Multicast (NORM) Protocol," RFC 3940, 2004.
- M. Luby, J. Gemmell, L. Vicisano, L. Rizzo, J. Crowcroft, "Asynchronous Layered Coding (ALC) Protocol Instantiation," RFC 3450, 2002.
- A. Fiat, M. Naor, "Broadcast Encryption," in Proc. of the 13th Annual International Cryptology Conference on Advances in Cryptology, pp. 480-491, 1994.
- D. Naor, M. Naor, J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," in Proc. of the 21st Annual International Cryptology Conference on Advances in Cryptology, pp. 41-62, 2001.
- S. Zhu, S. Jajodia, "Scalable Group Key Management for Secure Multicast: a Taxonomy and New Directions," Network Security, pp. 57-75, 2010.