Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast for large-group multimedia communication. We address offering data confidentiality tailored for ALM. To achieve confidentiality, a node may need to continuously re-encrypt packets before forwarding them downstream. Furthermore, keys have to be changed whenever there is a membership change, leading to rekey processing overhead at the nodes. For a large and dynamic group, these reencryption and rekeying operations incur high processing overhead at the nodes. We propose and analyze a scalable scheme called Secure Overlay Multicast (SOM) which clusters ALM peers so as to localize rekeying within a cluster and to limit re-encryption at cluster bou...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
Multicast is becoming an increasingly important transmission method on the Internet, since when de...
This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. Th...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
While scalability, routing and performance are core issues for Application-Level Multicast (ALM) pro...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
In secure group communications, there are both rekey and data traffic. We propose to use application...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
Proposals for multicast security that have been published so far are complex, often require trust in...
IP multicasting is the ability to send IP datagrams to a set of nodes, or a group, in such a way as ...
Proposals for multicast security that have been published so far are complex, often require trust in...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
Multicast is becoming an increasingly important transmission method on the Internet, since when de...
This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. Th...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
While scalability, routing and performance are core issues for Application-Level Multicast (ALM) pro...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Multicast is an efficient technique for delivering data to a large group of users in multimedia appl...
In secure group communications, there are both rekey and data traffic. We propose to use application...
Proposals for multicast security that have been published so far are complex, often require trust in...
Multicasting is increasingly used as an e#cient communication mechanism for group-oriented applicat...
Proposals for multicast security that have been published so far are complex, often require trust in...
IP multicasting is the ability to send IP datagrams to a set of nodes, or a group, in such a way as ...
Proposals for multicast security that have been published so far are complex, often require trust in...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
Multicast is becoming an increasingly important transmission method on the Internet, since when de...
This paper introduces a multicast method for renewing secrets which are shared by a set of hosts. Th...