M. Confidentiality, . Group, and . Bibliography, CERT Coordination Center

K. Almeroth and M. Ammar, Collection and modelling of the join/leave behavior of multicast group members in the mbone, Proceedings of High Performance Distributed Computing Focus Workshop (HPDC'96), 1996.

R. Atkinson, Security Architecture for the Internet Protocol, 1995.
DOI : 10.17487/rfc1825

J. W. Atwood, A classification of reliable multicast protocols, IEEE Network, vol.18, issue.3, 2004.
DOI : 10.1109/MNET.2004.1301019

M. Bellare, R. Canetti, and H. Krawczyk, Keying Hash Functions for Message Authentication, Lecture Notes in CS, vol.1109, pp.1-15, 1996.
DOI : 10.1007/3-540-68697-5_1

S. Bellovin, M. Leech, and T. Taylor, ICMP traceback messages, IETF Draft, 2003.

M. Borella, D. Swider, S. Uludag, and G. Brewster, Internet packet loss: measurement and implications for end-to-end QoS, Proceedings of the 1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing (Cat. No.98EX206), 1998.
DOI : 10.1109/ICPPW.1998.721868

B. Briscoe, MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences, First International Workshop on Networked Group Communication, 1999.
DOI : 10.1007/978-3-540-46703-8_19

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

H. Burch and W. Cheswick, Tracing anonymous packets to their approximate source, Systems Administration Conference, 2003.

R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor et al., Multicast security: a taxonomy and some efficient constructions, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1999.
DOI : 10.1109/INFCOM.1999.751457

. Cert-coordination and . Center, CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, 1996.

. Cert-coordination and . Center, CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, 1998.

. Cert-coordination and . Center, Denial of Service Attacks, 1999.

C. Ios, Unicast Reverse Path Forwarding, 1999.

T. H. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algorithms, 1992.

S. E. Deering, RFC 1112: Host extensions for IP multicasting, 1989.
DOI : 10.17487/rfc0988

S. E. Deering, Multicast Routing in a Datagram Internetwork, 1991.

E. Duros, W. Dabbous, H. Izumiyama, N. Fujii, and Y. Zhang, A Link-Layer Tunneling Mechanism for Unidirectional Links, RFC, vol.3077, 2001.
DOI : 10.17487/rfc3077

W. Fenner, Internet Group Management Protocol, Version 2 " , Request For Comments 2236, see also draft-ietf-idmr-igmpv3-and-routing-01, 1997.

P. Ferguson and D. Senie, Network Ingress Filtering: Defeating Denial of Service attacks which employ IP source address spoofing, 2000.

A. Fiat and M. Naor, Broadcast Encryption, Advances in Cryptology -Crypto '93, pp.480-491, 1993.
DOI : 10.1007/3-540-48329-2_40

S. Floyd, V. Jacobson, C. Liu, S. Mccanne, and L. Zhang, A Reliable Multicast Framework for Lightweigth Session and Application Layer Framing, In IEEE/ACM Trans. on Networking, 1997.

R. Gennaro and P. Rohatgi, How to sign digital streams, Advances in Cryptology -Proceedings of CRYPTO 97, pp.180-197, 1997.
DOI : 10.1007/BFb0052235

O. Goldreich, S. Goldwasser, and S. Micali, On the Cryptographic Applications of Random Functions, CRYPTO, pp.276-288, 1984.

P. Golle and N. Modadugo, Streamed authentication in the presence of random packet loss, Proceedings of NDSS, 2001.

T. Henderson, Networking over Next-Generation Satellite Systems, 1999.

M. Howarth, S. Iyengar, Z. Sun, and H. Cruickshank, Dynamics of Key Management in Secure Satellite Multicast, IEEE Journal on Selected Areas in Communications, vol.22, issue.2, 2004.
DOI : 10.1109/JSAC.2003.819978

S. Josset, L. Duquerroy, M. Önen, M. Annoni, G. Boiero et al., Satellite IPSEC: An optimized way of securing multicast wireless communications, Information Security Solutions Europe, 2002.

P. Karn and W. Simpson, Photuris : Session-Key Management Protocol, 1999.
DOI : 10.17487/rfc2522

S. K. Kasera, J. Kurose, and D. Towsley, A comparison server-based and reciver-based local recovery approaches for scalable reliable multicast, IEEE INFOCOM, 1998.

H. Krawczyk, M. Bellare, and R. Canetti, HMAC : Keyed Hashing for Message Authentication, RFC, vol.2104, 1997.
DOI : 10.17487/rfc2104

X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, Batch rekeying for secure group communications, Proceedings of the tenth international conference on World Wide Web , WWW '01, pp.525-534, 2001.
DOI : 10.1145/371920.372153

S. Lin and D. J. Costello, Error Correcting Codes: Fundamentals and Applications, 1983.

M. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Spielman, and V. Stemann, Practical loss-resilient codes, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.150-159, 1997.
DOI : 10.1145/258533.258573

G. Maral and M. Bousquet, Satellite Communications Systems: systems, techniques ,technology, 1993.
DOI : 10.1002/9780470834985

S. Miner and J. Staddon, Graph-based authentication of digital streams, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001.
DOI : 10.1109/SECPRI.2001.924301

S. Mittra, Iolus: A Framework for Scalable Secure Multicasting, Proceedings of the ACM SIGCOMM'97, 1997.

R. Molva, Internet security architecture, Computer Networks, vol.31, issue.8, pp.787-804, 1999.
DOI : 10.1016/S1389-1286(98)00016-4

R. Molva and A. Pannetrat, Scalable multicast security in dynamic groups, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.101-112, 1999.
DOI : 10.1145/319709.319723

R. Molva and A. Pannetrat, Scalable multicast security with dynamic recipient groups, ACM Transactions on Information and System Security, vol.3, issue.3, p.3, 2000.
DOI : 10.1145/357830.357834

J. Nonnenmacher, Reliable Multicast Transport to Large Groups, 1998.

J. Nonnenmacher, E. W. Biersack, and D. Towsley, Parity-based loss recovery for reliable multicast transmission, IEEE/ACM Transactions on Networking, vol.6, issue.4, pp.349-361, 1998.
DOI : 10.1109/90.720869

M. Önen and R. Molva, Group rekeying with a customer perspective, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004., 2004.
DOI : 10.1109/ICPADS.2004.1316099

M. Önen and R. Molva, How to satisfy both customers and service providers in secure multicast?, 2004.

M. Önen and R. Molva, Reliable group rekeying with a customer perspective, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004.
DOI : 10.1109/GLOCOM.2004.1378376

A. Pannetrat and R. Molva, Efficient Multicast Packet Authentication, 2003.

A. Pannetrat and R. Molva, Multiple Layer Encryption for Multicast Groups, CMS'2002, Communication and Multimedia Security 2002 Conference Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security, 2002.
DOI : 10.1007/978-0-387-35612-9_11

J. M. Park, E. K. Chong, and H. J. Siegel, Efficient multicast packet authentication using signature amortization, 2002 IEEE Symposium on Security and Privacy, 2002.

A. Perrig, R. Canetti, J. Tygar, and D. Song, Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000.
DOI : 10.1109/SECPRI.2000.848446

A. Perrig, D. Song, and D. Tygar, ELK, a New Protocol for Efficient Large-Group Key Distribution, IEEE Symposium on Security and Privacy, 2001.

I. S. Reed and G. Solomon, Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960.
DOI : 10.1137/0108018

R. L. Rivest, A. Shamir, and L. M. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978.
DOI : 10.1145/359340.359342

R. Rivest, The MD5 message-digest algorithm, 1992.
DOI : 10.17487/rfc1321

L. Rizzo, Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997.
DOI : 10.1145/263876.263881

P. Rohatgi, A compact and fast hybrid signature scheme for multicast packet authentication, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.93-100, 1999.
DOI : 10.1145/319709.319722

S. Ross, A First Course in Probability, 1998.

S. Setia, S. Zhu, and S. Jajodia, A comparative performance analysis of reliable group rekey transport protocols for secure multicast, Performance Evaluation, vol.49, issue.1-4, 2002.
DOI : 10.1016/S0166-5316(02)00130-X

K. Siu and R. Jain, A brief overview of ATM, ACM SIGCOMM Computer Communication Review, vol.25, issue.2, pp.6-28, 1995.
DOI : 10.1145/210613.210616

J. Snoeyink, S. Suri, and G. Varghese, A lower bound for multicast key distribution, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), 2001.
DOI : 10.1109/INFCOM.2001.916725

J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin et al., Self-healing key distribution with revocation, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.224-240, 2002.
DOI : 10.1109/SECPRI.2002.1004375

D. Towsley, J. Kurose, and S. Pingali, A comparison of sender-initiated and receiver-initiated reliable multicast protocols, IEEE Journal on Selected Areas in Communications, vol.15, issue.3, pp.398-406, 1997.
DOI : 10.1109/49.564137

R. Vetter, ATM concepts, architectures, and protocols, Communications of the ACM, vol.38, issue.2, 1995.
DOI : 10.1145/204826.204831

M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, The VersaKey framework: versatile group key management, IEEE Journal on Selected Areas in Communications, vol.17, issue.9, pp.1614-1631, 1999.
DOI : 10.1109/49.790485

D. M. Wallner, E. J. Harder, and R. C. Agee, Key Management for Multicast: Issues and Architectures, RFC, vol.26, p.27, 1999.
DOI : 10.17487/rfc2627

C. Wong and S. Lam, Keystone: a group key management system, Proceedings of International Conference in Telecommunications, 2000.

C. K. Wong, M. Gouda, and S. S. Lam, Secure Group Communications Using Key Graphs, ACM SIGCOMM 1998, pp.68-79, 1998.
DOI : 10.1145/285243.285260

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

C. K. Wong and S. S. Lam, Digital signatures for flows and multicasts, IEEE/ACM Transactions on Networking, vol.7, issue.4, pp.502-513, 1999.
DOI : 10.1109/90.793005

M. Yajnick, J. Kurose, and D. Tosley, Packet loss correlation in the MBone multicast network, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference, pp.96-128, 1996.
DOI : 10.1109/GLOCOM.1996.586133

Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, Reliable group rekeying : A Performance Analysis, In ACM Sigcomm, 2001.

X. B. Zhang, S. S. Lam, D. Y. Lee, and Y. R. Yang, Protocol design for scalable and reliable group rekeying, SPIE Conference on Scalability and Traffic Control IP Networks, 2001.
DOI : 10.1109/TNET.2003.820256

X. Zhang, S. Lam, and D. Lee, Group rekeying with limited unicast recovery, Computer Networks, vol.44, issue.6, pp.855-870, 2004.
DOI : 10.1016/j.comnet.2003.12.012

S. Zhu, S. Setia, and S. Jajodia, Performance Optimizations for Group Key MAnagement Schemes for Secure Multicast, The 23rd IEEE International Conference on Distribued Computing (ICDCS), 2003.

G. Zipf, Human Behavior and the Principle of Least Effort, 1949.