Goncalves M, Niles K: Multicasting overview. In IP Multicasting: Concepts and Application. McGraw-Hill, New York, NY, USA; 1999:91–117.
Google Scholar
Vida R, Costa, Eds L: Multicast Listener Discovery Version 2 (MLDv2) for IPv6. 2004.
Chapter
Google Scholar
Jia X: A distributed algorithm of delay-bounded multicast routing for multimedia applications in wide area networks. IEEE/ACM Transactions on Networking 1998,6(6):828–837. 10.1109/90.748092
Article
Google Scholar
Banerjee S, Kommareddy C, Kar K, Bhattacharjee B, Khuller S: Construction of an efficient overlay multicast infrastructure for real-time applications. Proceedings of 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 2: 1521–1531.
Varshney U: Multicast over wireless networks. Communications of the ACM 2002,45(12):31–37. 10.1145/585597.585598
Article
Google Scholar
Baugher M, Canetti R, Dondeti L, Lindholm F: Multicast Security (MSEC) Group Key Management Architecture. Requests For Comments—4046, 2005
Perkins C: IP Mobility Support. (Request for Comments—2002), IETF Network working group, 1996
Bruschi D, Rosti E: Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications 2002,7(6):503–511. special issue on multipoint communication in wireless mobile networks 10.1023/A:1020781305639
Article
Google Scholar
Karygiannis T, Owens L: Wireless network security, 802.11, Bluetooth and Handheld Devices. NIST Special Publication 800–48, 2002, http://csrc.nist.gov/publications/nistpubs/800–48/NIST_SP_800–48.pdf NIST Special Publication 800-48, 2002,
Sun L, Liao Y, Zheng J, Yichuan W, Ma J: An efficient multicast protocol in mobile IPv6 networks. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC '04), March 2004, Atlanta, Ga, USA 1: 155–159.
Rivest RL, Shamir A, Adleman L: A method for obtaining digital signatures and public-key cryptosystems. ACM Communication 1978,21(2):120–126. 10.1145/359340.359342
Article
MATH
MathSciNet
Google Scholar
Johnson D, Menezes A: The elliptic curve digital signature algorithm (ECDSA). In Tech. Rep. 99–34. University of Waterloo, Canada; 1999. http://www.cacr.math.uwaterloo.ca
Google Scholar
Rivest R: The MD5 Message-Digest Algorithm. 1992.
Chapter
Google Scholar
Vida R, Costa E: Multicast Listener Discovery Version 2 (MLD) for IPv6. 2004.
Google Scholar
Waldvogel M, Caronni G, Sun D, Weiler N, Plattner B: The versakey framework: versatile group key management. IEEE Journal on Selected Areas in Communications 1999,17(9):1614–1631. 10.1109/49.790485
Article
Google Scholar
Stallings W: Cryptography and Network Security, Principles and Practice. 2nd edition. Prentice Hall, Englewood Cliffs, NJ, USA; 1999.
Google Scholar