메뉴 건너뛰기




Volumn 35, Issue 4, 2001, Pages 32-38

Secure and efficient key management for dynamic multicast groups

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0039560732     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/506084.506087     Document Type: Article
Times cited : (6)

References (11)
  • 1
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo random bits
    • M. Blum and S. Micali, "How to generate cryptographically strong sequences of pseudo random bits," SIM Journal of Computing, vol.13, no.4, pp.850-864, 1984.
    • (1984) SIM Journal of Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 2
    • 0031142511 scopus 로고    scopus 로고
    • Key derivation for network management applications
    • May/June
    • Uri Blumenthal, Nguyen C. Hien, and Bert Wijnen, "Key Derivation for Network Management Applications," IEEE Network, pp.26-29, May/June 1997.
    • (1997) IEEE Network , pp. 26-29
    • Blumenthal, U.1    Hien, N.C.2    Wijnen, B.3
  • 5
    • 0032627571 scopus 로고    scopus 로고
    • Key management for secure internet multicast using boolean function minimization techniques
    • March
    • I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques," In Proc. of IEEE Infocom'99, March 1999.
    • (1999) Proc. of IEEE Infocom'99
    • Chang, I.1    Engel, R.2    Kandlur, D.3    Pendarakis, D.4    Saha, D.5
  • 6
    • 84894043862 scopus 로고
    • Flexible access control with master keys
    • LNCS 435, Springer-Verlag
    • G.C. Chick and S.E. Tavares, "Flexible access control with master keys," Advances in Cryptology - Crypto'89, LNCS 435, pp. 316-322, Springer-Verlag, 1990.
    • (1990) Advances in Cryptology - Crypto'89 , pp. 316-322
    • Chick, G.C.1    Tavares, S.E.2
  • 7
    • 0022793132 scopus 로고
    • How to construct random functions
    • O. Goldreich, S. Goldwasser, and S. Micali, "How to Construct Random Functions," JACM, vol.33, no.4, pp.792-807, 1986.
    • (1986) JACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 8
    • 0008482739 scopus 로고    scopus 로고
    • ID-based secret-key cryptography
    • Oct.
    • M. Joye and S.-M. Yen, " ID-based Secret-Key Cryptography," Operating Systems Review, vol.32, no.4, pp.33-39, Oct. 1998.
    • (1998) Operating Systems Review , vol.32 , Issue.4 , pp. 33-39
    • Joye, M.1    Yen, S.-M.2
  • 11
    • 0002360030 scopus 로고    scopus 로고
    • Secure group communication using key graphs
    • September 2-4, Vancouver, Canada
    • C. K. Wong, M. Gouda, and S. S. Lam, "Secure Group Communication Using Key Graphs", In Proc. of ACM SIGCOMM'98, September 2-4, Vancouver, Canada.
    • Proc. of ACM SIGCOMM'98
    • Wong, C.K.1    Gouda, M.2    Lam, S.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.