We propose mechanisms for providing security services for source specific multicast(SSM) in networks including mobile hosts. First we categorize security requirements in SSM applications. Then we present some protocols for building multicast trees, distributing security keys, and sending messages securely in two categories of security requirements: authenticated SSM without rekeying and authenticated SSM with rekeying. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Shim, Y. C., & Park, J. C. (2003). Secure source specific multicast for networks including mobile hosts. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2668, 181–190. https://doi.org/10.1007/3-540-44843-8_20
Mendeley helps you to discover research relevant for your work.