We introduce spatial clustering of multicast group members as a mechanism to scale wide-area multicast-based applications. To motivate the use of such structures, we present a clustering based re-keying scheme for secure multicast. Using amortized analysis, we show that the communication, processing, and storage costs for this scheme to distribute keys upon membership changes is of constant order. This improves upon the previously known best-case logarithmic bounds under the same assumptions. Next, we develop a clustering algorithm and a cluster formation protocol that can be built atop IP multicast to create clusters with properties required to implement the secure multicast scheme. To show the viability of such a clustering s...
http://www.springer.com/Securing multicast communications in ad hoc networks must consider several c...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Proposals for multicast security that have been published so far are complex, often require trust in...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
Reliable multicasting based distributed simulations and conferences require safe data packet deliver...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
In reliable multicast, the multicast packets must be acknowledged. We propose a clustering structure...
Applications based on multicasting such as real-time simulations or shared editors require that all ...
A variety of rooted tree-based secure multicast networks with different efficiencies and storage req...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast ...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
In this dissertation we study four areas where members’ cooperative behavior in discovering and sha...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
We describe a new application-layer multicast protocol that is specifically designed to scale to l...
In reliable multicast protocols, each data packet being sent must be acknowledged. Collecting the ac...
http://www.springer.com/Securing multicast communications in ad hoc networks must consider several c...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Proposals for multicast security that have been published so far are complex, often require trust in...
We introduce and analyze a scalable re-keying scheme for implementing secure group communications I...
Reliable multicasting based distributed simulations and conferences require safe data packet deliver...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
In reliable multicast, the multicast packets must be acknowledged. We propose a clustering structure...
Applications based on multicasting such as real-time simulations or shared editors require that all ...
A variety of rooted tree-based secure multicast networks with different efficiencies and storage req...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast ...
Application layer multicast (ALM) has been proposed to overcome current limitations in IP multicast....
In this dissertation we study four areas where members’ cooperative behavior in discovering and sha...
IP multicast is a promising communication model for group oriented applications. Unfortunately, the ...
We describe a new application-layer multicast protocol that is specifically designed to scale to l...
In reliable multicast protocols, each data packet being sent must be acknowledged. Collecting the ac...
http://www.springer.com/Securing multicast communications in ad hoc networks must consider several c...
[[abstract]]With the widespread use of Internet applications such as Teleconference, Pay-TV, Collabo...
Proposals for multicast security that have been published so far are complex, often require trust in...