-
2
-
-
84920422930
-
One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist
-
IEEE Computer Society Press
-
Blakley, G., "One-time pads are Key Safeguarding Schemes, not Cryptosystems: Fast Key Safeguarding Schemes (Threshold Schemes) Exist", Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1980, pp. 108-113.
-
(1980)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 108-113
-
-
Blakley, G.1
-
3
-
-
0348106251
-
Threshold schemes with disenrollment
-
Springer-Verlag
-
Blakley, B., Blakley, G., Chan, A., Massey, J., "Threshold Schemes With Disenrollment", Advances in Cryptology: Proceedings of CRYPTO'92, Springer-Verlag.
-
Advances in Cryptology: Proceedings of CRYPTO'92
-
-
Blakley, B.1
Blakley, G.2
Chan, A.3
Massey, J.4
-
4
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer-Verlag
-
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M., "Perfectly-Secure Key Distribution for Dynamic Conferences", Advances in Cryptology: Proceedings of CRYPTO'92, Springer-Verlag, 1993, pp. 478-493.
-
(1993)
Advances in Cryptology: Proceedings of CRYPTO'92
, pp. 478-493
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
85029546799
-
On the size of shares for secret sharing schemes
-
Springer-Verlag
-
Capocelli, R., De Santis, A., Gargano, L., Vaccaro, U., "On the Size of Shares for Secret Sharing Schemes", Advances in Cryptology: Proceedings of CRYPTO'91, Springer-Verlag, 1992, pp. 101-113.
-
(1992)
Advances in Cryptology: Proceedings of CRYPTO'91
, pp. 101-113
-
-
Capocelli, R.1
De Santis, A.2
Gargano, L.3
Vaccaro, U.4
-
7
-
-
0343452731
-
A secure broadcasting scheme based on discrete logarithms
-
Chang, C. C., Hwang, S. J., "A Secure Broadcasting Scheme Based on Discrete Logarithms", Control and Computers, Vol. 20, No. 2, 1992, pp. 49-53.
-
(1992)
Control and Computers
, vol.20
, Issue.2
, pp. 49-53
-
-
Chang, C.C.1
Hwang, S.J.2
-
8
-
-
0024715386
-
Secure broadcasting using the secure lock
-
August
-
Chiou, G. H., Chen, W. T., "Secure Broadcasting Using the Secure Lock", IEEE Transactions on Software Engineering, Vol. 15, No. 8, August 1989, pp. 929-934.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.H.1
Chen, W.T.2
-
10
-
-
5244317013
-
A store-and-forward architecture for video-on-demand service
-
Banff, Alberta, Aug.13-16
-
Fortier, M., "A Store-and-Forward Architecture for Video-on-Demand Service", presented at Multimedia Communications'93, Banff, Alberta, Aug.13-16, 1993, pp. 262-268.
-
(1993)
Multimedia Communications'93
, pp. 262-268
-
-
Fortier, M.1
-
11
-
-
0021409284
-
Probabilistic encryption
-
Goldwasser, S., Micali, S., "Probabilistic Encryption", Journal of Computer and System Sciences, Vol. 28, 1984, pp. 270-299.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
12
-
-
0021496883
-
Point-to-multipoint communication over broadcast links
-
Gopal, J., Jaffe, M., "Point-to-multipoint Communication over Broadcast Links", IEEE Transactions on Communications, COM-32(9), 1982, pp. 1034-1044.
-
(1982)
IEEE Transactions on Communications
, vol.COM-32
, Issue.9
, pp. 1034-1044
-
-
Gopal, J.1
Jaffe, M.2
-
15
-
-
0024718179
-
A new threshold scheme and its applications in designing the conference key distribution cryptosystem
-
Laih, C., Lee, J., Harn, L., "A New Threshold Scheme and its Applications in Designing the Conference Key Distribution Cryptosystem", Information Processing Letters, Vol. 32, 1989, pp. 95-99.
-
(1989)
Information Processing Letters
, vol.32
, pp. 95-99
-
-
Laih, C.1
Lee, J.2
Harn, L.3
-
16
-
-
0012767905
-
A conference key broadcasting system using sealed locks
-
Lin, C. H., Chang, C. C., Lee, R. C., "A Conference Key Broadcasting System Using Sealed Locks", Information Systems, Vol. 17, No. 4, 1992, pp. 323-328.
-
(1992)
Information Systems
, vol.17
, Issue.4
, pp. 323-328
-
-
Lin, C.H.1
Chang, C.C.2
Lee, R.C.3
-
17
-
-
0018545449
-
How to share a secret
-
November
-
Shamir, A., "How to Share a Secret", Communications of the ACM, Vol. 22, No. 11, November 1979, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C., "Communication Theory of Secrecy Systems", Bell System Technical Journal, Vol. 28, 1949, pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
19
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
IEEE Press
-
Simmons, G., "An Introduction to Shared Secret and/or Shared Control Schemes and their Application", Contemporary Cryptology, IEEE Press, 1991, pp. 441-497.
-
(1991)
Contemporary Cryptology
, pp. 441-497
-
-
Simmons, G.1
|