Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Multicast routing in a datagram internetwork
Multicast routing in a datagram internetwork
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
An architecture for wide-area multicast routing
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
vic: a flexible framework for packet video
Proceedings of the third ACM international conference on Multimedia
Log-based receiver-reliable multicast for distributed interactive simulation
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
A reliable multicast framework for light-weight sessions and application level framing
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Multicast security and its extension to a mobile environment
Wireless Networks
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
IP multicast channels: EXPRESS support for large-scale single-source applications
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Nark: receiver-based multicast non-repudiation and key management
Proceedings of the 1st ACM conference on Electronic commerce
Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking (TON)
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Batch rekeying for secure group communications
Proceedings of the 10th international conference on World Wide Web
ACM Transactions on Information and System Security (TISSEC)
Authenticated multicast immune to denial-of-service attack
Proceedings of the 2002 ACM symposium on Applied computing
Secure key agreement for group communications
International Journal of Network Management
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
Comparison of inter-area rekeying algorithms for secure wireless group communications
Performance Evaluation
Probabilistic optimization techniques for multicast key management
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the topology of multicast trees
IEEE/ACM Transactions on Networking (TON)
A Secure Group Solution for Multi-Agent EC System
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
A New Approach for Secure Multicast Routing in a Large Scale Network
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Coding Constructions for Blacklisting Problems without Computational Assumptions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Dynamic Group Key Management Protocol
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Network Security in the Multicast Framework
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
A Scalable Framework for Secure Group Communication
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Probabilistic Methods in Multicast Key Management
ISW '00 Proceedings of the Third International Workshop on Information Security
Network security in the multicast framework
Advanced lectures on networking
An adaptive video multicast scheme for varying workloads
Multimedia Systems
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
DISEC: A Distributed Framework for Scalable Secure Many-to-Many Communication
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Robustness to inflated subscription in multicast congestion control
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
A Constant Size Rekeying Message Framework for Secure Multicasting
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Algorithms for dynamic multicast key distribution trees
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
A scalable key-management scheme with minimizing key storage for secure group communications
International Journal of Network Management
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Scalable and lightweight key distribution for secure group communications
International Journal of Network Management
SAKM: a scalable and adaptive key management approach for multicast communications
ACM SIGCOMM Computer Communication Review
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
A middleware service for secure group communication in mobile ad hoc networks
Journal of Systems and Software - Special issue: Computer software & applications
Key management for high bandwidth secure multicast
Journal of Computer Security
A group key recovery mechanism based on logical key hierarchy
Journal of Computer Security
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
Balancing performance and confidentiality in air index
Proceedings of the 14th ACM international conference on Information and knowledge management
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
A computationally efficient key-hiding based group re-keying scheme for secure multicasting
International Journal of Computers and Applications
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
Design of multicast protocols robust against inflated subscription
IEEE/ACM Transactions on Networking (TON)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
Chinese remainder theorem based group key management
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
A communication-efficient and fault-tolerant conference-key agreement protocol with forward secrecy
Journal of Systems and Software
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Antigone: a flexible framework for secure group communication
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Scalable solutions for secure group communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Efficient group key management for multi-privileged groups
Computer Communications
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
DKMS: distributed hierarchical access control for multimedia networks
International Journal of Security and Networks
Proceedings of the 2nd international conference on Scalable information systems
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
Offering data confidentiality for multimedia overlay multicast: Design and analysis
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Optimal communication complexity of generic multicast key distribution
IEEE/ACM Transactions on Networking (TON)
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
A key management solution for overlay-live-streaming
Proceedings of the workshop on Security in Opportunistic and SOCial networks
International Journal of Ad Hoc and Ubiquitous Computing
Secure group communication in wireless mesh networks
Ad Hoc Networks
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Approximation Algorithms for Key Management in Secure Multicast
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
A lower bound for multicast key distribution
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management scheme for multi-layer secure group communication
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
Attacking Group Multicast Key Management Protocols Using Coral
Electronic Notes in Theoretical Computer Science (ENTCS)
Mykil: a secure and highly available key management system for large group multicast
International Journal of Computers and Applications
Key-update distribution in secure group communication
Computer Communications
Scalable key management for secure multicast communication in the mobile environment
Pervasive and Mobile Computing
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Tackling adaptive corruptions in multicast encryption protocols
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Secure source specific multicast for networks including mobile hosts
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Evaluation and analysis of computational complexity for secure multicast models
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
A group key management supporting individual batch rekeying and fault tolerance for secure multicast
ICCS'03 Proceedings of the 2003 international conference on Computational science: PartIII
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
Multigroup rekeying for a wireless network
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Scalable and efficient approach for secure group communication
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
A comparison of keying methods in the Hubenko architecture as applied to wireless sensor networks
International Journal of Autonomous and Adaptive Communications Systems
DAKS: an efficient batch rekeying scheme for departure-aware multicast services
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
Mobile Networks and Applications
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
Secure unicast and multicast over satellite DVB using chaotic generators
International Journal of Internet Technology and Secured Transactions
Overlay routing under geographically correlated failures in distributed event-based systems
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems: Part II
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Multi-seed key distribution scheme with test system
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
Journal of Systems and Software
On performance of group key distribution techniques when applied to IPTV services
Computer Communications
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Distributed group access control architecture for secure multicast
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
Key management for secure multicast using the ringnet hierarchy
CIS'04 Proceedings of the First international conference on Computational and Information Science
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
A hierarchical key management approach for secure multicast
ARCS'06 Proceedings of the 19th international conference on Architecture of Computing Systems
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Key management for secure overlay multicast
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A secure multicast routing protocol for ad hoc networks with misbehaving nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
EKM: an efficient key management scheme for large-scale peer-to-peer media streaming
PCM'06 Proceedings of the 7th Pacific Rim conference on Advances in Multimedia Information Processing
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Building a secure and highly scalable data distribution system
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Distributed hierarchical access control for secure group communications
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Secure multicast in micro-mobility environments
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Distributing key updates in secure dynamic groups
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Efficient clustering for multicast key distribution in MANETs
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Supporting dynamically changing authorizations in pervasive communication systems
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Secure multicast using proxy encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Network access control for mobile ad-hoc networks
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Key derivation algorithms for monotone access structures in cryptographic file systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Fast algorithms for the free riders problem in broadcast encryption
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fine-grained user access control in ciphertext-policy attribute-based encryption
Security and Communication Networks
Scalable secure one-to-many group communication using dual encryption
Computer Communications
Key management schemes for multilayer and multiple simultaneous secure group communication
ISRN Communications and Networking
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
Hierarchical approaches for multicast based on Euclid's algorithm
The Journal of Supercomputing
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
IEEE/ACM Transactions on Networking (TON)
Secure group re-keying using key inverses
Journal of High Speed Networks
Hi-index | 0.01 |
As multicast applications are deployed for mainstream use, the need to secure multicast communications will become critical. Multicast, however, does not fit the point-to-point model of most network security protocols which were designed with unicast communications in mind. As we will show, securing multicast (or group) communications is fundamentally different from securing unicast (or paired) communications. In turn, these differences can result in scalability problems for many typical applications.In this paper, we examine and model the differences between unicast and multicast security and then propose Iolus: a novel framework for scalable secure multicasting. Protocols based on Iolus can be used to achieve a variety of security objectives and may be used either to directly secure multicast communications or to provide a separate group key management service to other "security-aware" applications. We describe the architecture and operation of Iolus in detail and also describe our experience with a protocol based on the Iolus framework.