期刊文献+

基于代理的大型组播密钥管理系统

Agent-based key management system for large-scale multicast
下载PDF
导出
摘要 组播安全问题一直是组播研究的一个难点,该文在以往研究的基础上,通过对大型密钥系统的分析提出了一个基于代理的密钥管理系统;它通过增加在代理上的一次加密过程,将整个组播组划分为若干个子组,分别进行控制;从而使得系统具有良好的可扩展性,也适用于组播成员频繁变化的情况。 The problem of multicast security has been a difficulty in multicast research. Based on the analysis of several common key management systems, an agent-based key management system for large-scale multicast is put forward. By increasing an encryption at the agent, the whole multicast group is divided into several subgroups and the subgroups are controlled separately, thus making the system have good scalahility and be suitable for frequent changing of multicast members.
出处 《合肥工业大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第8期988-991,共4页 Journal of Hefei University of Technology:Natural Science
关键词 组播 代理 密钥管理 multicast agent key management
  • 相关文献

参考文献8

二级参考文献67

  • 1[1]Deering S. Host extensions for IP multicasting. IETF RFC1112, 1989. 被引量:1
  • 2[2]Quinn B, Almeroth K. IP multicast applications: Challenges and solutions. IETF RFC 3170, 2001. 被引量:1
  • 3[3]Fenner W. Internet group management protocol, version 2. IETF RFC2236, 1997. 被引量:1
  • 4[4]Cain B, Deering S, Kouvelas I, Fenner B, Thyagarajan A. Internet group management protocol, version 3. IETF RFC3376, 2002. 被引量:1
  • 5[5]Krusus PS, Macker JP. Techniques and issues in multicast security. In: Proceedings of the Military Communications Conference. Boston, 1998. 1028~1032. 被引量:1
  • 6[6]Canetti R, Pinkas B. A taxonomy of multicast security issues. Internet Draft, 2000. 被引量:1
  • 7[7]Snoeyink J, Suri S, Varghese G. A lower bound for multicast key distribution. In: Proceedings of the IEEE INFOCOM 2001. Anchorage, 2001. 422~431. 被引量:1
  • 8[8]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols. In: Proceedings of the 15th International Conference on Information Networking. Beppu City, 2001. 831~838. 被引量:1
  • 9[9]Li M, Poovendran R, Berenstein C. Design of secure multicast key management schemes with communication budget constraint. IEEE Communications Letters, 2000,6(3):108~110. 被引量:1
  • 10[10]Poovendran R, Baras JS. An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001,47(7):2824~2834. 被引量:1

共引文献129

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部