Reliable communication in the presence of failures
ACM Transactions on Computer Systems (TOCS)
Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Multicast routing in datagram internetworks and extended LANs
ACM Transactions on Computer Systems (TOCS)
A matrix key-distribution scheme
Journal of Cryptology
A new threshold scheme and its application in designing the conference key distribution cryptosystem
Information Processing Letters
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
Asynchronous transfer mode (2nd ed.): solution for broadband ISDN
Asynchronous transfer mode (2nd ed.): solution for broadband ISDN
ATM user-network interface specification (version 3.0)
ATM user-network interface specification (version 3.0)
A conversation with Marvin Minsky about agents
Communications of the ACM
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Distributed process groups in the V Kernel
ACM Transactions on Computer Systems (TOCS)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Towards Security in an Open Systems Federation
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Integrating Security in a Group Oriented Distributed System
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Preventing Denial and Forgery of Causal Relationships in Distributed Systems
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Prudent Engineering Practice for Cryptographic Protocols
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
A Secure Group Membership Protocol
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Security protocol for IEEE 802.11 wireless local area network
Mobile Networks and Applications - Special issue on wireless LANs
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A scalable multicast key management scheme for heterogeneous wireless networks
IEEE/ACM Transactions on Networking (TON)
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Science of Computer Programming
Enclaves: enabling secure collaboration over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
International Journal of Ad Hoc and Ubiquitous Computing
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure source specific multicast for networks including mobile hosts
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
Secure group communication with self-healing and rekeying in wireless sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Hi-index | 0.00 |
Multicast is rapidly becoming an important mode of communication and a good platform for building group-oriented services. To be used for trusted communication, however, current multicast schemes must be supplemented by mechanisms for protecting traffic, controlling participation, and restricting access of unauthorized users to data exchanged by the participants. In this paper, we consider fundamental security issues in building a trusted multicast facility. We discuss techniques for group-based data encryption, authentication of participants, and preventing unauthorized transmissions and receptions. We also describe the application of these principles and techniques in designing an architecture for secure multicast in a mobile environment.