Citation: | YANG Guo-qing, HUAN Zheng-liang, GE Ping-ju. A Security Multicast System Model Based on IPSec[J]. INFORMATION AND CONTROL, 2004, 33(2): 167-171. |
[1] |
Fenner W. RFC 2236 Internet Group Management Protocol, Version 2 [EB/OL]. http://www. ietf. org/rfc. html, 1997. 11.
|
[2] |
Deering S E. RFC1112 Hostextensions for IP Multicasting [EB/OL]. http://www. ietf. org/rfc. html,1989.8.
|
[3] |
Wallner D. RFC2627 Key Management for Multicast: Issues and Architectures [EB/OL]. http://www. ietf. org/ric. html, 1999.6.
|
[4] |
Quinn B. RFC3170 IP Multicast Applications: Challenges and Solutions [EB/OL]. http://www. ietf. org/rfc. html, 2001.9.
|
[5] |
DoraswamyI N,Harkins D.IPSec——新一代因特网安全标准[M].北京:机械工业出版社,2000.
|
[1] | DING Da, CAO Jie. Overview of Network Security of Cyber-Physical Systems[J]. INFORMATION AND CONTROL, 2019, 48(5): 513-521, 527. DOI: 10.13976/j.cnki.xk.2019.9160 |
[2] | SHANG Wenli, YANG Luyao, CHEN Chunyu, YIN Long, ZENG Peng, LIU Zhoubin. Lightweight Group Authentication Mechanism for Industrial Control System Terminals[J]. INFORMATION AND CONTROL, 2019, 48(3): 344-353. DOI: 10.13976/j.cnki.xk.2019.8539 |
[3] | ZHANG Kai, QIAN Huanyan. Optimal Power Allocation for Wireless Multicast Networks with Non-regenerative Relaying Based on Cooperative Communication Technology[J]. INFORMATION AND CONTROL, 2011, 40(3): 323-330. |
[4] | LI Chang-bing, CAO Chang-xiu, LI Yin-guo, YU Yi-bin. A Multicast Tree Construction Algorithm Based on QoS Constraints[J]. INFORMATION AND CONTROL, 2008, 37(1): 81-86. |
[5] | TIAN Yuan, JIANG Hai-wen, LI Ming-chu. A Group-Key Distribution Protocol for Highly Lossy Transmission Environment[J]. INFORMATION AND CONTROL, 2007, 36(1): 39-46. |
[6] | TIAN Yuan, LI Ming-chu, LING Zhi-guang. An Enhanced Protocol for Source Authentication in Sensor Networks[J]. INFORMATION AND CONTROL, 2006, 35(6): 732-736,748. |
[7] | QIN Ling, CHEN Ling, ZHOU Ri-gui, GU Qi, WU Yan. A Multicast Routing Algorithm Based on Ant Colony System[J]. INFORMATION AND CONTROL, 2006, 35(5): 545-550. |
[8] | ZHENG Yan-fei, LI Hui, CHEN Ke-fei. Some Trends in the Security of Wireless Sensor Networks[J]. INFORMATION AND CONTROL, 2006, 35(2): 233-238. |
[9] | WENG Yi-fang, JU Lei. DESIGN OF CHAOTIC SYNCHRONIZED SECURE COMMUNICA-TION SCHEME WITH TIME-VARYING PARAMETERS[J]. INFORMATION AND CONTROL, 2003, 32(2): 128-131. |
[10] | SUN Liang, ZHANG Junguo, FAN Zhiping, PAN Dehui. STUDY ON THE PRICING MODEL OF STOCK DERIVATIVE SECURITY[J]. INFORMATION AND CONTROL, 1998, 27(4): 300-303. |