期刊文献+

安全组播核心问题研究

Study of Core Problems in Secure Multicast
下载PDF
导出
摘要 组播提供了一种发送者可以同时发送信息到多个接收者的高效通信机制,但组播的安全问题却阻碍了组播技术的广泛使用。首先总结了影响组播安全性的因素及组播的安全需求,然后具体地分析了在安全组播核心问题上已有主要成果的优点与不足,最后探讨了该领域的研究趋势,指出了亟待解决的几个重点问题。 IP Multicast provides an efficient mechanism for a sender to send messages to multiple receivers simultaneously. However, security becomes the major obstacle to its wide application in practice. In this paper, the main factors that affect secure multicast and its security requirements are summarized; then the strengths and shortcomings of major schemes of core problems in secure muhicast are investigated in detail; finally, the research tendency of multicast security is analyzed, and some problems urgently to be solved are pointed out.
作者 乔石 陈礼青
出处 《淮阴工学院学报》 CAS 2009年第5期43-47,共5页 Journal of Huaiyin Institute of Technology
关键词 组播 组播安全 源认证 组密钥管理 muhicast multicast security source authentication group key management
  • 相关文献

参考文献7

  • 1T. Hardjono, G. Tsudik. IP Multicast Security: Issues and Directions [ J ]. Annales des Telecommunications/ Annals of Telecommunications, 2000, 55 ( 7 ) : 324 - 340.
  • 2L. Chen, Z. Cheng, N. P. Smart. Identity- Based Key Agreement Protocols From Pairings [ J ]. International Journal of Information Security, 2007,16 (4) : 213 - 241.
  • 3张猛,王大玲,于戈.一种基于自动阈值发现的文本聚类方法[J].计算机研究与发展,2004,41(10):1748-1753. 被引量:16
  • 4康恺,林坤辉,周昌乐.基于主题词频数特征的文本主题划分[J].计算机应用,2006,26(8):1993-1995. 被引量:11
  • 5傅间莲,陈群秀.基于连续段落相似度的主题划分算法[J].计算机应用,2005,25(9):2022-2024. 被引量:10
  • 6Luhn H P. The automatic creation of literature abstract [ J ]. IBM Journal of Research and Development April, 1958,2(2) :159 - 165.
  • 7Marti A Hearst Texttiling Segmenting text into multi - paragraph subtopic passages [ J ]. Computational Linguistics, 1997,23(1) :33 -64.

二级参考文献22

  • 1J MacQueen. Some methods for classification and analysis of multivariate observation. In: Proc of the 5th Berkeley Symp Math Statist and Prob 1. California; University of California Press,1967. 281~297
  • 2L Kaufman, P J Rousseeuw. Finding Groups in Data: An Introduction to Cluster Analysis. New York: John Wiley & Sons,1990
  • 3M Ankerst, M M Breunig, H P Kriegel, et al. OPTICS:Ordering points to identify the clustering structure. In: Proc of the 1999 ACM SIGMOD Int'l Conf on Management of Data (SIGMOD' 99). New York: ACM Press, 1999. 164~169
  • 4A Hotho, G Stumme. Conceptual clustering of text clusters.FGML Workshop, Hannover, 2002
  • 5D S Modha, W S Spangler. Feature weighting in k-means clustering. Machine Learning, 2003, 52(3): 217~237
  • 6F Beil, M Ester, X Xu. Frequent term-based text clustering. In:Proc of 2002 Int Conf Knowledge Discovery and Data Mining.New York: ACM Press, 2002. 436~442
  • 7B B Wang, R I McKay, Hussein AAbbass, etal. A comparative study for domain ontology guided feature extraction. In: Proc of 26th Australian Computer Science Conference (ACSC2003).Darlinghurst, Australia: Australian Computer Society Inc, 2003.69~ 78
  • 8DEERWESTER S,DUMAIS ST,LANDAUER TK,et al.Indexing by latent semantic analysis[J].Journal of Society for Information Science,1990,41 (6):391-407.
  • 9CHANG H-C,HSU C-C.Using topic keyword clusters for automatic document clustering[J].IEEE Transactions on Information and Systems,2005,E88-D(8):1852-1860.
  • 10CHANG HC,HSU CC,DENG YW.Automatic document clustering based on keyword clusters using partitions of weighted undirected graph[A].Proceedings of 2003 Symposium on Digital Life and Intemet Technologies[C].2003.

共引文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部