] >
[1] G. An, D. Gui-Guang, D. Qiong-Hai, and L. Chuang. BulkTree: an overlay network architecture for live media streaming. Journal of Zhejiang University SCIENCE, 2006.
[2] S. Banerjee, B. Bhattacharjee, and C. Kommareddy. Scalable application layer multicast. In ACM SIGCOMM, pages 205–217, October 2002.
[3] M. Castro, P. Druschel, A-M. Kermarrec, A. Nandi, A. Rowstron, and A. Singh. Splitstream: High-bandwidth content distribution in a cooperative environment. In Peer-to-Peer Systems II, February 2003.
[4] M. Castro, P. Druschel, A-M. Kermarrecand, and A. Rowstron. SCRIBE: A Large-scale and Decentralized Application-level Multicast Infrastructure. In IEEE JSAC, volume 8, pages 100–110, October 2002.
[5] Y. Chawathe. Scattercast: An Architecture for Internet Broadcast Distribution as an Infrastructure Service. PhD thesis, University of California, Berkeley, 2000.
[6] Bram Cohen. http://www.bittorrent.com, 2001.
[7] H. Deshpande, M. Bawaand, and H. Garcia-Molina. Streaming Live Media over Peers. Technical report, CS-Stanford, 2002.
[8] M. Dobuzhskaya, R. Liu, J. Roewe, and N. Sharma. Zebra: Peer to Peer Multicast For Live Streaming Video. Technical report, Massachusetts Institute of Technology, 2004.
[9] Free Software Foundation. http://www.gnu.org/licenses/gpl.html.
[10] The Xiph.org Foundation. Icecast.org. http://www.icecast.org.
[11] P. Francis. Yoid: Extending the Internet Multicast Architecture. The ICSI Networking and Security Group, http://www.icir.org/yoid/docs/ycHtmlL/htmlRoot.html, April 2000.
[12] IETF. Peer to Peer Streaming Protocol (PPSP). http://datatracker.ietf.org/wg/ppsp/charter/.
[13] J. Jannotti, D.K. Gifford, K.L. Johnson, M.F. Kaashoek, and Jr.J.W. OT́oole. Overcast: Reliable multicasting with an overlay network. In Operating Systems Design and Implementation, pages 197–212, 2000.
[14] D. Kostic, A. Rodriguez, J. Albrecht, and A. Vahdat. Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh. In ACM SOSP, October.
[15] J. Lin, K. Huang, F. Lai, and H. Lee. Secure and efficient group key management with shared key derivation. Comput. Stand. Inter., 31(1):192 – 208, 2009.
[16] Cristobal Medina-López, J.A.M. Naranjo, Juan Pablo García-Ortiz, L. G. Casado, and Vicente González-Ruiz. Execution of the P2PSP protocol in parallel environments. In Guillermo Botella y Alberto A. Del Barrio Garcia, editor, Actas XXIV Jornadas de Paralelismo (http://www.congresocedi.es/images/site/actas/ActasParalelismo.pdf), pages 216–221, Madrid, Septiembre 2013.
[17] J.J.D. Mol, Dick Epema, and Henk J. Sips. The Orchard Algorithm: P2P Multicasting without Free-riding.
[18] J. A. M. Naranjo, L. G. Casado, and J. A. López-Ramos. Group oriented renewal of secrets and its application to secure multicast. Journal of Information Science and Engineering, 27(4):1303–1313, july 2011.
[19] V.N. Padmanabhan, H.J. Wang, and P.A. Chou. Resilient Peer-to-Peer Streaming. In Network Protocols, IEEE International Conference on, pages 16–27.
[20] A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and David E. Culler. SPINS: security protocols for sensor networks. Wirel. Netw., 8:521–534, 2002.
[21] F. Pianese, J. Keller, and E. W. Biersack. PULSE, a Flexible P2P Live Streaming System, booktitle = INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. pages 1–6, 2006.
[22] P2PSP Team. Implementation of the P2PSP (Peer to Peer Straightforward Protocol) in Lauchpad. https://launchpad.net/p2psp.
[23] P2PSP Team. Peer to Peer Straightforward Protocol. http://p2psp.org/en/p2psp-protocol.
[24] D.A. Tran, K.A. Hua, and T. Do. Zigzag: An efficient peer-to-peer scheme for media streaming. In IEEE INFOCOM, volume 2, pages 1283–1292, April 2003.
[25] Lihao Xu and Cheng Huang. Computation-efficient multicast key distribution. IEEE Trans. Parallel Distrib. Syst., 19(5):577–587, May 2008.
[26] Y.Chu, S. Rao, and H. Zhang. A case for end system multicast. In Proceedings of ACM SIGMETRICS, pages 1–12, 2000.
[27] Eun-Jun Yoon and Kee-Young Yoo. A secure broadcasting cryptosystem and its application to grid computing. Future Generation Computer Systems, 27(5):620 – 626, 2011.
[28] Z. Zhou and D. Huang. An optimal key distribution scheme for secure multicast group communication. In INFOCOM’10, pages 331–335, 2010.