-
1
-
-
85028765277
-
Perfectly secure key distribution for dynamic conferences
-
Springer-Verlag, Berlin, August
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, "Perfectly Secure Key Distribution for Dynamic Conferences," in Advances in Cryptology - CRYPTO '92, LNCS 740, Springer-Verlag, Berlin, August 1993, pp. 471-486.
-
(1993)
Advances in Cryptology - CRYPTO '92, LNCS 740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
2
-
-
84955614214
-
Tradeoffs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
-
Springer Verlag, Berlin, August
-
C. Blundo, L. A. Frota Mattos and D. R. Stinson, "Tradeoffs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution," Advances in Cryptology - CRYPTO '96, LNCS 1109, Springer Verlag, Berlin, August 1996, pp. 387-400.
-
(1996)
Advances in Cryptology - CRYPTO '96, LNCS 1109
, pp. 387-400
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
3
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
dated September 1, 2000. NAI Labs Technical Report #00-010
-
D. W. Carmam, P. S. Kruus and B. J. Matt, "Constraints and Approaches for Distributed Sensor Network Security," dated September 1, 2000. NAI Labs Technical Report #00-010, available at http://download.nai.com/products/media/nai/zip/nailabs-report-00-010-final.zip
-
-
-
Carmam, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
4
-
-
84979291225
-
Broadcast encryption
-
Springer-Verlag, Berlin, August
-
A. Fiat and M. Naor, "Broadcast Encryption," in Advances in Cryptology - CRYPTO '93, LNCS 773, Springer-Verlag, Berlin, August 1993, pp. 480-491.
-
(1993)
Advances in Cryptology - CRYPTO '93, LNCS 773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
5
-
-
0034445661
-
System architecture directions for network sensors
-
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister, "System architecture directions for network sensors," Proc. of ASPLOS-IX, Cambridge, Mass. 2000.
-
Proc. of ASPLOS-IX, Cambridge, Mass. 2000
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
6
-
-
0010227321
-
Fast encryption and authentication: XCBC encryption and XECB authentication modes
-
M.Matsui (ed), LNCS 2355, Springer Verlag, April
-
V.D. Gligor and P. Donescu, "Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes," Fast Software Encryption 2001, M.Matsui (ed), LNCS 2355, Springer Verlag, April 2001.
-
(2001)
Fast Software Encryption 2001
-
-
Gligor, V.D.1
Donescu, P.2
-
8
-
-
0004103610
-
Encryption modes with almost free message integrity
-
B. Pfitzmann (ed.), LNCS 2045, Springer Verlag, May
-
C.S. Jutla, "Encryption Modes with Almost Free Message Integrity," Advances in Cryptology - EUROCRYPT 2001, B. Pfitzmann (ed.), LNCS 2045, Springer Verlag, May 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001
-
-
Jutla, C.S.1
-
9
-
-
85116610435
-
Mobile networking for smart dust
-
J. M. Kahn, R. H. Katz and K. S. J. Pister, "Mobile Networking for Smart Dust," ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MobiCom 99), Seattle, WA, August 17-19, 1999, pp. 271-278.
-
ACM/IEEE Intl. Conf. on Mobile Computing and Networking (MobiCom 99), Seattle, WA, August 17-19, 1999
, pp. 271-278
-
-
Kahn, J.M.1
Katz, R.H.2
Pister, K.S.J.3
-
10
-
-
0037953335
-
-
A Touchstone Book, Simon & Schuster, Inc.
-
Leo Marks, Between Silk and Cyanide - A Codemaker's War, 1941-1945, A Touchstone Book, Simon & Schuster, Inc., 2000.
-
(2000)
Between Silk and Cyanide - a Codemaker's War, 1941-1945
-
-
Marks, L.1
-
11
-
-
0035750947
-
OCB: A block-cipher mode of operations for efficient authenticated encryption
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz, "OCB: A Block-Cipher Mode of Operations for Efficient Authenticated Encryption," Proc. of the 8th ACM Conf. on Computer and Communication Security, Philadelphia, Penn., November 2001.
-
Proc. of the 8th ACM Conf. on Computer and Communication Security, Philadelphia, Penn., November 2001
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
12
-
-
0037615371
-
-
Algorithms and Combinatorics 22, Springer-Verlag; ISBM 3-540-41654-4
-
J. Spencer, The Strange Logic of Random Graphs, Algorithms and Combinatorics 22, Springer-Verlag 2000, ISBM 3-540-41654-4.
-
(2000)
The Strange Logic of Random Graphs
-
-
Spencer, J.1
-
13
-
-
0013413164
-
-
John Wiley and Sons, New York, Feb. 12; ISBN: 0-470-84493-0
-
F. Stajano, Security for Ubiquitous Computing, John Wiley and Sons, New York, Feb. 12, 2002, ISBN: 0-470-84493-0, 267 pp.
-
(2002)
Security for Ubiquitous Computing
, pp. 267
-
-
Stajano, F.1
-
14
-
-
0025438148
-
ABYSS: An architecture for software protection
-
June
-
S.R. White and L. Comerford, "ABYSS: An Architecture for Software Protection," IEEE Transactions on Software Engineering, vol. 16, No. 6, June 1990, pp. 619-629.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 619-629
-
-
White, S.R.1
Comerford, L.2
|