1Deuk-Whee Kwak, SeungJoo Lee, JongWon Kim, Eunjin Jung. An Efficient LKH Tree Balancing Algorithm for Group Key Management [C]. IEEE COMMUNICATIONS LETTERS,2006,10(3):222-224.
2Mittra S. A Framework for scalable secure Muhicasting [C]. Proceedings of ACM SIGCOMM'97,1997:277-288.
5Ateniese G, Steiner M,Tsudik G. New multi-party authentication services and key agreement protocols[J]. IEEE JSAC, 2000, 18(4):628- 639.
6Y.Sun,W.Trappe,and K. J. R. Liu. An Efficient Key Management Scheme for Secure Wireless Muhicast[C]. presented at IEEE International Conference on Communication, 2002:1236-1240.
7Y.Kim,A.Perrig, and G.Tsudik,Tree-based Group Key Agreement[J].ACM on information and system security, 2004,7(1): 60--96.
8Ossaiiia Younis and Sonia Fahmy,Distributed Clustering in Ad-hoc Sensor Networks: A Hybrid,Energy- Efficient Approach [M]. in Proceeding of IEEE INFOCOM, 2004:629-640.
二级参考文献32
1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989.
2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001.
3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997.
4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002.
5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032.
6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000.
7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431.
8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838.
9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110.
10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834.