A hierarchical multicast monitoring scheme
COMM '00 Proceedings of NGC 2000 on Networked group communication
MarconiNet supporting streaming media over localized wireless multicast
WMC '02 Proceedings of the 2nd international workshop on Mobile commerce
WHIM: watermarking multicast video with a hierarchy of intermediaries
Computer Networks: The International Journal of Computer and Telecommunications Networking
IEEE Transactions on Knowledge and Data Engineering
Probabilistic optimization techniques for multicast key management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Probabilistic Methods in Multicast Key Management
ISW '00 Proceedings of the Third International Workshop on Information Security
Performance Optimizations for Group Key Management Schemes
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
Efficient security mechanisms for overlay multicast based content delivery
Computer Communications
A Scalable Overlay Multicast Architecture for Large-Scale Applications
IEEE Transactions on Parallel and Distributed Systems
Supporting multicast deployment efforts: a survey of tools for multicast monitoring
Journal of High Speed Networks
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
ACM Transactions on Information and System Security (TISSEC)
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
TKS: a transition key management scheme for secure application level multicast
International Journal of Security and Networks
A tree key graph design scheme for hierarchical multi-group access control
IEEE Communications Letters
Chosen ciphertext secure authenticated group communication using identity-based signcryption
Computers & Mathematics with Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient security mechanisms for overlay multicast-based content distribution
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
gTrace: simple mechanisms for monitoring of multicast sessions
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Exploiting the temporal dimension in QoS-aware multicast routing
Computer Communications
Fine-grained user access control in ciphertext-policy attribute-based encryption
Security and Communication Networks
A new approach for delay-constrained routing
Computer Communications
The directed reverse path join (DRPJ) protocol: an efficient multicast routing protocol
Computer Communications
A routing algorithm for dynamic multicast trees with end-to-end path length control
Computer Communications
DynaPeer: a dynamic peer-to-peer based delivery scheme for VoD systems
Euro-Par'07 Proceedings of the 13th international Euro-Par conference on Parallel Processing
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.25 |
The multicast backbone (MBone) is a network overlaying the global Internet and designed to support multipoint applications. The authors first give an overview of the development and architecture of the current MBone. One important characteristic of the MBone is its reliance on IP multicast which allows receivers to join and leave groups asynchronously. The authors describe the Mlisten data collection tool that was created to provide a mechanism for capturing information about when members join and leave a multicast group. Using data collected with Mlisten, the authors present statistics about some of the MBone sessions they monitored. Results are provided for key parameters including multicast participant interarrival times and participant durations, multicast tree size and characteristics, and intersession relationships. Collecting data about MBone usage can improve our understanding of how multicast communication and real-time protocols are being used today