期刊文献+

一种基于PKI的安全多播方案

A SECURE MULTICAST SCHEME BASED ON PKI
在线阅读 下载PDF
导出
摘要 本文简单介绍了多播的安全问题及其研究现状,分析了决定多播安全机制的主要因素,并给出了安全多播参考框架。以PKI信息安全体系作为安全的基础,提出了一种基于PKI的安全多播方案,该方案能够很好的解决多播中的数据保密性、完整性、多播组成员的身份认证等问题;同时采用树形结构使多播成员的密钥管理非常简单,并可以很好地保证多播方案的可扩展性。 This paper briefly introduces muhicast security problems and related work, analyses factors in security multicast and presents a reference framework for secure muhicast. A new scheme based on PKI is proposed, The scheme solves muhicast security problems such as the privacy and integrity of data, authentication of senders. Besides, multicast tree is adopted to manage key is very simple, and multicast member is more scalable.
作者 田莹 王丽君
出处 《微计算机信息》 北大核心 2006年第05X期58-60,共3页 Control & Automation
基金 辽宁省教委基金 编号:2004F037
关键词 安全多播 公钥基础设施 密钥管理 多播树 secure multicast PKI key manage multicast tree
  • 相关文献

参考文献5

  • 1Hamey H, Muckenhim C, Group Key Management Protocol(GKMP) specification/architecture Request for Comments RFC-2093 and RFC-2094,Internet Engineering Task Force, July 1997.
  • 2Wong C, Gouda M, Lam S. Secure group communications using key graphs, Technical Report TR-97-23, University of Texas at Auxlin, Department of Computer Sciences, August 1997.
  • 3Iolus S M, A framework scalable secure multicast, Proceeding of ACM SIGCOMM'97, Cannes, France, Sept 1997:277-288.
  • 4Sanjeev Setia, Samir Konssih Jajodia, Krouos: A scalable group re-keying approach for secure multicast, In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland:CA, May 2000:215-228.
  • 5曹来成.PKI安全的关键:CA的私钥保护[J].微计算机信息,2005,21(12X):75-77. 被引量:10

二级参考文献7

  • 1毕文军,高健.关键词语音标引系统的实现[J].微计算机信息,2005,21(3):220-221. 被引量:6
  • 2Dailey Paulson L.New technology beefs up BIOS.Computer,May 2004,37(5):22~23.
  • 3Richard A,Kemmerer.Cybersecurity.In:25th International Conference on Software Engineering,Portland,Oregon USA,2003,1~11.
  • 4Ammann.A.,Jajodia.S.,Peng Liu.A Fault Tolerance Approach to Survivability.In:Computer Security,Dependability and Assurance:From Needs to Solutions,proceedings,7-9 July 1998,York,England,11-13November,1998,Williamsburg,Virginia,1998,204~212.
  • 5Malkin M.,Wu T.,Boneh,D.Building intrusion tolerant applications.In:DARPA Information Survivability Conference and Exposition,South Carolina,United States,Jan.2000,25~27.
  • 6Lauter K.The advantages of elliptic curve cryptography for wireless security,Wireless Communications,IEEE[see also IEEE Personal Communications],Feb 2004 11(1):62 ~67.
  • 7张险峰,刘锦德.一种基于门限ECC的入侵容忍CA方案[J].计算机应用,2004,24(2):5-8. 被引量:21

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部