Schneier, Applied Cryptography, 1995, pp. 3, 78, 173, 506, 514. |
Ingemar Ingemarsson, Donald T. Tang, and C. K. Wong, "A Conference Key Distribution System," IEEE Transactions on Information Theory, Sep. 1982. |
Guang-Huei Chiou, Wen-Tsuen Chen, "Secure Broadcasting Using the Secure Lock," IEEE Transactions on Information Software Engineering, Aug. 1989. |
Mike Burmester, Yvo G. Desmedt, "Efficient and Secure Conference-Key Distribution," Security Protocols Workshop 1996. |
Li Gong, Nacham Shacham, "Multicast Security and its Extension to a Mobile Environment," ACM-Baltzer Journal of Wireless Networks, Oct. 1995. |
Suvo Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proceedings of the ACM SIGCOMM '97, Sep. 14-18, 1997. |
T. Ballardie, J. Crowcroft, "Multicast-Specific Security Threats and Counter-Measures," Symposium on Network and Distributed System Security, 1995. |
Ashar Aziz, Martin Patterson, "Design and Implementation of SKIP," White Paper ICG-95-0004, Jun. 28, 1995. |
A. Ballardie, "Scalable Multicast Key Distribution," rfc1949.txt at info.internet.isi.edu, May 1996. |
H. Harney, C. Muckenhirn, "Group Key Management Protocol (GKMP) Specification," rfc2093.txt at info.internet.isi.edu, Jul. 1997. |
H. Harney, C. Muckenhirn, "Group Key Management Protocol (GKMP) Architecture," rfc2094.txt at info.internet.isi.edu, Jul. 1997. |