CERT Coordination Center ,
Collection and modelling of the join/leave behavior of multicast group members in the mbone, Proceedings of High Performance Distributed Computing Focus Workshop (HPDC'96), 1996. ,
Security Architecture for the Internet Protocol, 1995. ,
DOI : 10.17487/rfc1825
A classification of reliable multicast protocols, IEEE Network, vol.18, issue.3, 2004. ,
DOI : 10.1109/MNET.2004.1301019
Keying Hash Functions for Message Authentication, Lecture Notes in CS, vol.1109, pp.1-15, 1996. ,
DOI : 10.1007/3-540-68697-5_1
ICMP traceback messages, IETF Draft, 2003. ,
Internet packet loss: measurement and implications for end-to-end QoS, Proceedings of the 1998 ICPP Workshop on Architectural and OS Support for Multimedia Applications Flexible Communication Systems. Wireless Networks and Mobile Computing (Cat. No.98EX206), 1998. ,
DOI : 10.1109/ICPPW.1998.721868
MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences, First International Workshop on Networked Group Communication, 1999. ,
DOI : 10.1007/978-3-540-46703-8_19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.378.6478
Tracing anonymous packets to their approximate source, Systems Administration Conference, 2003. ,
Multicast security: a taxonomy and some efficient constructions, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320), 1999. ,
DOI : 10.1109/INFCOM.1999.751457
CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks, 1996. ,
CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, 1998. ,
Denial of Service Attacks, 1999. ,
Unicast Reverse Path Forwarding, 1999. ,
Introduction to Algorithms, 1992. ,
RFC 1112: Host extensions for IP multicasting, 1989. ,
DOI : 10.17487/rfc0988
Multicast Routing in a Datagram Internetwork, 1991. ,
A Link-Layer Tunneling Mechanism for Unidirectional Links, RFC, vol.3077, 2001. ,
DOI : 10.17487/rfc3077
Internet Group Management Protocol, Version 2 " , Request For Comments 2236, see also draft-ietf-idmr-igmpv3-and-routing-01, 1997. ,
Network Ingress Filtering: Defeating Denial of Service attacks which employ IP source address spoofing, 2000. ,
Broadcast Encryption, Advances in Cryptology -Crypto '93, pp.480-491, 1993. ,
DOI : 10.1007/3-540-48329-2_40
A Reliable Multicast Framework for Lightweigth Session and Application Layer Framing, In IEEE/ACM Trans. on Networking, 1997. ,
How to sign digital streams, Advances in Cryptology -Proceedings of CRYPTO 97, pp.180-197, 1997. ,
DOI : 10.1007/BFb0052235
On the Cryptographic Applications of Random Functions, CRYPTO, pp.276-288, 1984. ,
Streamed authentication in the presence of random packet loss, Proceedings of NDSS, 2001. ,
Networking over Next-Generation Satellite Systems, 1999. ,
Dynamics of Key Management in Secure Satellite Multicast, IEEE Journal on Selected Areas in Communications, vol.22, issue.2, 2004. ,
DOI : 10.1109/JSAC.2003.819978
Satellite IPSEC: An optimized way of securing multicast wireless communications, Information Security Solutions Europe, 2002. ,
Photuris : Session-Key Management Protocol, 1999. ,
DOI : 10.17487/rfc2522
A comparison server-based and reciver-based local recovery approaches for scalable reliable multicast, IEEE INFOCOM, 1998. ,
HMAC : Keyed Hashing for Message Authentication, RFC, vol.2104, 1997. ,
DOI : 10.17487/rfc2104
Batch rekeying for secure group communications, Proceedings of the tenth international conference on World Wide Web , WWW '01, pp.525-534, 2001. ,
DOI : 10.1145/371920.372153
Error Correcting Codes: Fundamentals and Applications, 1983. ,
Practical loss-resilient codes, Proceedings of the twenty-ninth annual ACM symposium on Theory of computing , STOC '97, pp.150-159, 1997. ,
DOI : 10.1145/258533.258573
Satellite Communications Systems: systems, techniques ,technology, 1993. ,
DOI : 10.1002/9780470834985
Graph-based authentication of digital streams, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, 2001. ,
DOI : 10.1109/SECPRI.2001.924301
Iolus: A Framework for Scalable Secure Multicasting, Proceedings of the ACM SIGCOMM'97, 1997. ,
Internet security architecture, Computer Networks, vol.31, issue.8, pp.787-804, 1999. ,
DOI : 10.1016/S1389-1286(98)00016-4
Scalable multicast security in dynamic groups, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.101-112, 1999. ,
DOI : 10.1145/319709.319723
Scalable multicast security with dynamic recipient groups, ACM Transactions on Information and System Security, vol.3, issue.3, p.3, 2000. ,
DOI : 10.1145/357830.357834
Reliable Multicast Transport to Large Groups, 1998. ,
Parity-based loss recovery for reliable multicast transmission, IEEE/ACM Transactions on Networking, vol.6, issue.4, pp.349-361, 1998. ,
DOI : 10.1109/90.720869
Group rekeying with a customer perspective, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004., 2004. ,
DOI : 10.1109/ICPADS.2004.1316099
How to satisfy both customers and service providers in secure multicast?, 2004. ,
Reliable group rekeying with a customer perspective, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04., 2004. ,
DOI : 10.1109/GLOCOM.2004.1378376
Efficient Multicast Packet Authentication, 2003. ,
Multiple Layer Encryption for Multicast Groups, CMS'2002, Communication and Multimedia Security 2002 Conference Portoroz, Slovenia / Also published in the book : Advanced Communications and Multimedia Security, 2002. ,
DOI : 10.1007/978-0-387-35612-9_11
Efficient multicast packet authentication using signature amortization, 2002 IEEE Symposium on Security and Privacy, 2002. ,
Efficient authentication and signing of multicast streams over lossy channels, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 2000. ,
DOI : 10.1109/SECPRI.2000.848446
ELK, a New Protocol for Efficient Large-Group Key Distribution, IEEE Symposium on Security and Privacy, 2001. ,
Polynomial Codes Over Certain Finite Fields, Journal of the Society for Industrial and Applied Mathematics, vol.8, issue.2, pp.300-304, 1960. ,
DOI : 10.1137/0108018
A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol.21, issue.2, pp.120-126, 1978. ,
DOI : 10.1145/359340.359342
The MD5 message-digest algorithm, 1992. ,
DOI : 10.17487/rfc1321
Effective erasure codes for reliable computer communication protocols, ACM SIGCOMM Computer Communication Review, vol.27, issue.2, 1997. ,
DOI : 10.1145/263876.263881
A compact and fast hybrid signature scheme for multicast packet authentication, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.93-100, 1999. ,
DOI : 10.1145/319709.319722
A First Course in Probability, 1998. ,
A comparative performance analysis of reliable group rekey transport protocols for secure multicast, Performance Evaluation, vol.49, issue.1-4, 2002. ,
DOI : 10.1016/S0166-5316(02)00130-X
A brief overview of ATM, ACM SIGCOMM Computer Communication Review, vol.25, issue.2, pp.6-28, 1995. ,
DOI : 10.1145/210613.210616
A lower bound for multicast key distribution, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213), 2001. ,
DOI : 10.1109/INFCOM.2001.916725
Self-healing key distribution with revocation, Proceedings 2002 IEEE Symposium on Security and Privacy, pp.224-240, 2002. ,
DOI : 10.1109/SECPRI.2002.1004375
A comparison of sender-initiated and receiver-initiated reliable multicast protocols, IEEE Journal on Selected Areas in Communications, vol.15, issue.3, pp.398-406, 1997. ,
DOI : 10.1109/49.564137
ATM concepts, architectures, and protocols, Communications of the ACM, vol.38, issue.2, 1995. ,
DOI : 10.1145/204826.204831
The VersaKey framework: versatile group key management, IEEE Journal on Selected Areas in Communications, vol.17, issue.9, pp.1614-1631, 1999. ,
DOI : 10.1109/49.790485
Key Management for Multicast: Issues and Architectures, RFC, vol.26, p.27, 1999. ,
DOI : 10.17487/rfc2627
Keystone: a group key management system, Proceedings of International Conference in Telecommunications, 2000. ,
Secure Group Communications Using Key Graphs, ACM SIGCOMM 1998, pp.68-79, 1998. ,
DOI : 10.1145/285243.285260
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.125.1470
Digital signatures for flows and multicasts, IEEE/ACM Transactions on Networking, vol.7, issue.4, pp.502-513, 1999. ,
DOI : 10.1109/90.793005
Packet loss correlation in the MBone multicast network, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference, pp.96-128, 1996. ,
DOI : 10.1109/GLOCOM.1996.586133
Reliable group rekeying : A Performance Analysis, In ACM Sigcomm, 2001. ,
Protocol design for scalable and reliable group rekeying, SPIE Conference on Scalability and Traffic Control IP Networks, 2001. ,
DOI : 10.1109/TNET.2003.820256
Group rekeying with limited unicast recovery, Computer Networks, vol.44, issue.6, pp.855-870, 2004. ,
DOI : 10.1016/j.comnet.2003.12.012
Performance Optimizations for Group Key MAnagement Schemes for Secure Multicast, The 23rd IEEE International Conference on Distribued Computing (ICDCS), 2003. ,
Human Behavior and the Principle of Least Effort, 1949. ,