-
1
-
-
0017018484
-
New Directions in Cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
2
-
-
0033748607
-
New Multiparty Authentication Services and Key Agreement Protocols
-
Apr.
-
G, Ateniese, M. Steiner, and G. Tsudik, "New Multiparty Authentication Services and Key Agreement Protocols," IEEE J. Selected Areas in Comm., vol. 18, no. 4, Apr. 2000.
-
(2000)
IEEE J. Selected Areas in Comm.
, vol.18
, Issue.4
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
3
-
-
0020180459
-
A Conference Key Distribution System
-
Sept.
-
I. Ingemarsson, D. Tang, and C. Wong, "A Conference Key Distribution System," IEEE Trans. Information Theory, vol. 28, no. 5, pp. 714-720, Sept. 1982.
-
(1982)
IEEE Trans. Information Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
4
-
-
0002805974
-
A Secure Audio Teleconference System
-
D. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A Secure Audio Teleconference System," Proc. Advances in Cryptology - CRYPTO '88, pp. 520-528, 1988.
-
(1988)
Proc. Advances in Cryptology - CRYPTO '88
, pp. 520-528
-
-
Steer, D.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
6
-
-
0007464704
-
-
MS thesis, Computer Science Dept., Carleton Univ., Ottawa, Ontario, Aug.
-
M.K. Just, "Methods of Multiparty Cryptographic Key Establishment," MS thesis, Computer Science Dept., Carleton Univ., Ottawa, Ontario, Aug. 1994.
-
(1994)
Methods of Multiparty Cryptographic Key Establishment
-
-
Just, M.K.1
-
7
-
-
0029720059
-
Diffie-Hellman Key Distribution Extended to Groups
-
Mar.
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman Key Distribution Extended to Groups," Third ACM Conf. Computer and Comm. Security, pp. 31-37, Mar. 1996.
-
(1996)
Third ACM Conf. Computer and Comm. Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
11
-
-
0032178082
-
Secure Group Communications Using Key Graphs
-
C.K. Wong, M.G. Gouda, and S.S. Lam, "Secure Group Communications Using Key Graphs," Proc. ACM SIGCOMM '98 Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm., pp. 68-79, 1998.
-
(1998)
Proc. ACM SIGCOMM '98 Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm.
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
12
-
-
0003978251
-
-
Internet-Draft, Draft-Wallner-Key-Arch-00.txt, June
-
D.M. Wallner, E.G. Harder, and R.C. Agee, "Key Management for Multicast: Issues and Architecture," Internet-Draft, Draft-Wallner-Key-Arch-00.txt, June 1997.
-
(1997)
Key Management for Multicast: Issues and Architecture
-
-
Wallner, D.M.1
Harder, E.G.2
Agee, R.C.3
-
14
-
-
0033717661
-
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
-
Apr.
-
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton, and G. Tsudik, "Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments," Proc. 20th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), Apr. 2000.
-
(2000)
Proc. 20th IEEE Int'l Conf. Distributed Computing Systems (ICDCS)
-
-
Amir, Y.1
Ateniese, G.2
Hasse, D.3
Kim, Y.4
Nita-Rotaru, C.5
Schlossnagle, T.6
Schultz, J.7
Stanton, J.8
Tsudik, G.9
-
15
-
-
0003774039
-
-
Technical Report CNDS 98-4, The Center for Networking and Distributed Systems, John Hopkins Univ.
-
Y. Amir and J. Stanton, "The Spread Wide Area Group Communication System," Technical Report CNDS 98-4, The Center for Networking and Distributed Systems, John Hopkins Univ., 1998.
-
(1998)
The Spread Wide Area Group Communication System
-
-
Amir, Y.1
Stanton, J.2
-
21
-
-
0033617058
-
Breaking Generalized Diffie-Hellman Modulo: A Composite Is No Easier than Factoring
-
E. Biham, D. Boneh, and O. Reingold, "Breaking Generalized Diffie-Hellman Modulo: A Composite Is No Easier than Factoring," Information Processing Letters, vol. 70, pp. 83-87, 1999.
-
(1999)
Information Processing Letters
, vol.70
, pp. 83-87
-
-
Biham, E.1
Boneh, D.2
Reingold, O.3
-
22
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C.P. Schnorr, "Efficient Signature Generation by Smart Cards," J. Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
23
-
-
0003508562
-
-
FIPS PUB 186, May
-
U.S. National Institute of Standards and Technology (NIST), "The Digital Signature Standard," FIPS PUB 186, May 1994.
-
(1994)
The Digital Signature Standard
-
-
-
27
-
-
0031120737
-
Enclaves: Enabling Secure Collaboration over the Internet
-
L. Gong, "Enclaves: Enabling Secure Collaboration over the Internet," IEEE J. Selected Areas in Comm., pp. 567-575, 1997.
-
(1997)
IEEE J. Selected Areas in Comm.
, pp. 567-575
-
-
Gong, L.1
-
28
-
-
0003466087
-
-
Internet Request for Comment RFC 1949, Internet Engineering Task Force, May
-
A. Ballardie, "Scalable Multicast Key Distribution," Internet Request for Comment RFC 1949, Internet Engineering Task Force, May 1996.
-
(1996)
Scalable Multicast Key Distribution
-
-
Ballardie, A.1
-
29
-
-
0000961370
-
Iolus: A Framework for Scalable Secure Multicasting
-
Sept.
-
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proc. ACM SIGCOMM '97, Sept. 1997.
-
(1997)
Proc. ACM SIGCOMM '97
-
-
Mittra, S.1
-
31
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
Mar.
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proc. INFOCOMM '99, Mar. 1999.
-
(1999)
Proc. INFOCOMM '99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
32
-
-
0000636954
-
The VersaKey Framework: Versatile Group Key Management
-
Sept.
-
G. Caronni, M. Waldvogel, D. Sun, N. Weiler, and B. Plattner, "The VersaKey Framework: Versatile Group Key Management," IEEE J. Selected Areas in Comm., vol. 17, no. 9, Sept. 1999.
-
(1999)
IEEE J. Selected Areas in Comm.
, vol.17
, Issue.9
-
-
Caronni, G.1
Waldvogel, M.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
33
-
-
85180743150
-
Optimized Rekey for Group Communication Systems
-
Feb.
-
O. Rodeh, K. Birman, and D. Dolev, "Optimized Rekey for Group Communication Systems," Proc. Symp. Network and Distributed Systems Security (NDSS '00), pp. 37-48, Feb. 2000.
-
(2000)
Proc. Symp. Network and Distributed Systems Security (NDSS '00)
, pp. 37-48
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
34
-
-
84976763336
-
A Security Architecture for Fault-Tolerant Systems
-
Nov.
-
M. Reiter, K. Birman, and R. van Renesse, "A Security Architecture for Fault-Tolerant Systems," ACM Trans. Computer Systems, vol. 12, no. 4, pp. 340-371, Nov. 1994.
-
(1994)
ACM Trans. Computer Systems
, vol.12
, Issue.4
, pp. 340-371
-
-
Reiter, M.1
Birman, K.2
Van Renesse, R.3
-
35
-
-
0030126124
-
Distributing Trust with the Rampart Toolkit
-
Apr.
-
M.K. Reiter, "Distributing Trust with the Rampart Toolkit," Comm. ACM, vol. 39, no. 4, pp. 71-74, Apr. 1996.
-
(1996)
Comm. ACM
, vol.39
, Issue.4
, pp. 71-74
-
-
Reiter, M.K.1
-
37
-
-
0028429699
-
How to Securely Replicate Services
-
May
-
M.K. Reiter and K.P. Birman, "How to Securely Replicate Services," ACM Trans. Programming Languages and Systems, vol. 16, no. 3, pp. 986-1,009, May 1994.
-
(1994)
ACM Trans. Programming Languages and Systems
, vol.16
, Issue.3
-
-
Reiter, M.K.1
Birman, K.P.2
-
38
-
-
0030687261
-
Secure Reliable Multicast Protocols in a WAN
-
D. Malkhi, M. Merrit, and O. Rodeh, "Secure Reliable Multicast Protocols in a WAN," Int'l Conf. Distributed Computing Systems (ICDCS '97), pp. 87-94, 1997.
-
(1997)
Int'l Conf. Distributed Computing Systems (ICDCS '97)
, pp. 87-94
-
-
Malkhi, D.1
Merrit, M.2
Rodeh, O.3
-
39
-
-
0031364592
-
A High-Throughput Secure Reliable Multicast Protocol
-
D. Malkhi and M. Reiter, "A High-Throughput Secure Reliable Multicast Protocol," J. Computer Security, vol. 5, pp. 113-127, 1997.
-
(1997)
J. Computer Security
, vol.5
, pp. 113-127
-
-
Malkhi, D.1
Reiter, M.2
|