-
1
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo random bits
-
M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudo random bits," SIM Journal of Computing, vol.13, no.4, pp.850-864, 1984.
-
(1984)
SIM Journal of Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
2
-
-
0031142511
-
Key derivation for network management applications
-
May/June
-
Uri Blumenthal, Nguyen C. Hien, and Bert Wijnen, "Key Derivation for Network Management Applications," IEEE Network, pp.26-29, May/June 1997.
-
(1997)
IEEE Network
, pp. 26-29
-
-
Blumenthal, U.1
Hien, N.C.2
Wijnen, B.3
-
3
-
-
0032661699
-
Multicast security: A taxonomy and efficient authentication
-
March
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Efficient Authentication", In Proc. of IEEE Infocom '99, vol.2, pp.708-716, March 1999.
-
(1999)
Proc. of IEEE Infocom '99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
4
-
-
0031641387
-
Efficient security for large and dynamic multicast groups
-
IEEE Computer Society Press
-
G. Caronni, M. Waldvogel, D. Sun, and B. Plattner, "Efficient Security for Large and Dynamic Multicast Groups, In Proc. of the Seventh Workshop on Enabling Technologies, IEEE Computer Society Press, 1998.
-
(1998)
Proc. of the Seventh Workshop on Enabling Technologies
-
-
Caronni, G.1
Waldvogel, M.2
Sun, D.3
Plattner, B.4
-
5
-
-
0032627571
-
Key management for secure internet multicast using boolean function minimization techniques
-
March
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques," In Proc. of IEEE Infocom'99, March 1999.
-
(1999)
Proc. of IEEE Infocom'99
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
6
-
-
84894043862
-
Flexible access control with master keys
-
LNCS 435, Springer-Verlag
-
G.C. Chick and S.E. Tavares, "Flexible access control with master keys," Advances in Cryptology - Crypto'89, LNCS 435, pp. 316-322, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology - Crypto'89
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
7
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," JACM, vol.33, no.4, pp.792-807, 1986.
-
(1986)
JACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
8
-
-
0008482739
-
ID-based secret-key cryptography
-
Oct.
-
M. Joye and S.-M. Yen, " ID-based Secret-Key Cryptography," Operating Systems Review, vol.32, no.4, pp.33-39, Oct. 1998.
-
(1998)
Operating Systems Review
, vol.32
, Issue.4
, pp. 33-39
-
-
Joye, M.1
Yen, S.-M.2
-
11
-
-
0002360030
-
Secure group communication using key graphs
-
September 2-4, Vancouver, Canada
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure Group Communication Using Key Graphs", In Proc. of ACM SIGCOMM'98, September 2-4, Vancouver, Canada.
-
Proc. of ACM SIGCOMM'98
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|