-
3
-
-
0032218239
-
Communication complexity of group key distribution
-
(San Francisco, Calif., Nov.). ACM, New York
-
BECKER, C. AND WILLE, U. 1998. Communication complexity of group key distribution. In Proceedings of the 5th ACM Conference on Computer and Communications Security. (San Francisco, Calif., Nov.). ACM, New York.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
-
-
Becker, C.1
Wille, U.2
-
4
-
-
84957893731
-
On key agreement and conference key agreement
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
BOYD, C. 1997. On key agreement and conference key agreement. In Proceedings of the Information Security and Privacy: Australasian Conference. Lecture Notes in Computer Science, vol. 1270. Springer-Verlag, New York, 294-302.
-
(1997)
Proceedings of the Information Security and Privacy: Australasian Conference
, vol.1270
, pp. 294-302
-
-
Boyd, C.1
-
6
-
-
84948991087
-
A secure and efficient conference key distribution system (extended abstract)
-
A. D. Santis, Ed., Lecture Notes in Computer Science, Springer-Verlag, New York
-
BURMESTER, M. AND DESMEDT, Y. 1994. A secure and efficient conference key distribution system (extended abstract). In Advances in Cryptology - EUROCRYPT 94, A. D. Santis, Ed., Lecture Notes in Computer Science, vol. 950. Springer-Verlag, New York, pp. 275-286.
-
(1994)
Advances in Cryptology - EUROCRYPT 94
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
7
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
New Yok, N.Y., Mar.
-
CANETTI, R., GARAY, J., ITKIS, G., MICCIANCIO, D., NAOR, M., AND PINKAS, B. 1999a. Multicast Security: A Taxonomy and Some Efficient Constructions. In Proceedings of the IEEE INFOCOM. Vol. 2. (New Yok, N.Y., Mar.). 708-716.
-
(1999)
Proceedings of the IEEE INFOCOM
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
8
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
J. Stem, Ed. Lectures Notes in Computer Science, Springer-Verlag, New York
-
CANETTI, R., MALKIN, T., AND NISSIM, K. 1999b. Efficient communication-storage tradeoffs for multicast encryption. In Advances in Cryptology - EUROCRYPT '99, J. Stem, Ed. Lectures Notes in Computer Science, vol. 1599. Springer-Verlag, New York, pp. 459-474.
-
(1999)
Advances in Cryptology - EUROCRYPT '99
, vol.1599
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
9
-
-
0032627571
-
Key management for secure internet multicast using boolean function minimization techniques
-
New York, March 1999
-
CHANG, I., ENGEL, R., KANDLUR, D., PENDARAKIS, D., AND SAHA, D. 1999. Key management for secure internet multicast using boolean function minimization techniques. In IEEE INFOCOM. Vol. 2. (New York, March 1999), 689-698.
-
(1999)
IEEE INFOCOM
, vol.2
, pp. 689-698
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
10
-
-
0035728669
-
Secure group communications for wireless networks
-
DECLEENE, B., DONDETI, L., GRIFFIN, S., HARDJONO, T., KIWIOR, D., KUROSE, J., TOWSLEY, D., VASUDEVAN, S., AND ZHANG, C. 2001. Secure group communications for wireless networks. In Proceedings of the MILCOM.(June).
-
(2001)
Proceedings of the MILCOM
, Issue.JUNE
-
-
Decleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
Towsley, D.7
Vasudevan, S.8
Zhang, C.9
-
12
-
-
0017018484
-
New directions in cryptography
-
DIFFIE, W. AND HELLMAN, M. E. 1976. New directions in cryptography. IEEE Trans. Inf. Theory IT-22, 6 (Nov.), 644-654.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, Issue.6 NOV.
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
13
-
-
0344045402
-
A distributed group key management scheme for secure many-to-many communication
-
Department of Computer Science, University of Maryland
-
DONDETI, L., MUKHERJEE, S., AND SAMAL, A. 1999a. A distributed group key management scheme for secure many-to-many communication. Tech. Rep. PINTL-TR-207-99, Department of Computer Science, University of Maryland.
-
(1999)
Tech. Rep.
, vol.PINTL-TR-207-99
-
-
Dondeti, L.1
Mukherjee, S.2
Samal, A.3
-
14
-
-
0034318740
-
Scalable secure one-to-many group communication using dual encryption
-
DONDETI, L., MUKHERJEE, S., AND SAMAL, A. 1999b. Scalable secure one-to-many group communication using dual encryption. Comput. Commun. 23, 17 (Nov.), 1681-1701.
-
(1999)
Comput. Commun.
, vol.23
, Issue.17 NOV.
, pp. 1681-1701
-
-
Dondeti, L.1
Mukherjee, S.2
Samal, A.3
-
16
-
-
0022793132
-
How to construct random functions
-
GOLDREICH, O., GOLDWASSER, S., AND MICALI, S. 1986. How to construct random functions. J. ACM 33, 4 (Oct.), 792-807.
-
(1986)
J. ACM
, vol.33
, Issue.4 OCT.
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
17
-
-
0034226894
-
IP multicast security: Issues and directions
-
HARDJONO, T. AND TSUDIK, G. 2000. IP multicast security: Issues and directions. Ann. Telecom. 324-340.
-
(2000)
Ann. Telecom.
, pp. 324-340
-
-
Hardjono, T.1
Tsudik, G.2
-
20
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
(Athens, Greece Nov.). S. Jajodia and P. Samarati, Eds.
-
KIM, Y., PERRIG, A., AND TSUDIK, G. 2000. Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proceedings of the 7th ACM Conference in Computer and S. Communication Security, (Athens, Greece Nov.). (S. Jajodia and P. Samarati, Eds.), pp. 235-241.
-
(2000)
Proceedings of the 7th ACM Conference in Computer and S. Communication Security
, pp. 235-241
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
21
-
-
0344907707
-
Optimization of key storage for secure
-
John Hopkins, Mar.
-
LI, M., POOVENDRAN, R., AND BERENSTEIN, C. 2001. Optimization of key storage for secure. In Proceedings of the 35th Annual Conference on Information Sciences and Systems (CISS). (John Hopkins, Mar.).
-
(2001)
Proceedings of the 35th Annual Conference on Information Sciences and Systems (CISS)
-
-
Li, M.1
Poovendran, R.2
Berenstein, C.3
-
22
-
-
85084161955
-
Antigone: A flexible framework for secure group communication
-
Washington, D.C. Aug.
-
MCDANIEL, P., PRAKASH, A., AND HONEYMAN, P. 1999. Antigone: A flexible framework for secure group communication. In Proceedings of the 8th USENIX Security Symposium. (Washington, D.C. Aug.). 99-114.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 99-114
-
-
McDaniel, P.1
Prakash, A.2
Honeyman, P.3
-
23
-
-
0003557429
-
Key establishment in large dynamic groups using one-way function trees
-
TIS Labs at Network Associates, Inc., Glenwood, Md
-
MCGREW, D. A. AND SHERMAN, A. T. 1998. Key establishment in large dynamic groups using one-way function trees. Tech. Rep. No. 0755 (May), TIS Labs at Network Associates, Inc., Glenwood, Md.
-
(1998)
Tech. Rep. No. 0755
, vol.755
, Issue.MAY
-
-
McGrew, D.A.1
Sherman, A.T.2
-
26
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
(New York, Sept.) ACM, New York
-
MITTRA, S. 1997. Iolus: A framework for scalable secure multicasting. In Proceedings of the ACM SIGCOMM. Vol. 27, 4 (New York, Sept.) ACM, New York, pp. 277-288.
-
(1997)
Proceedings of the ACM SIGCOMM
, vol.27
, Issue.4
, pp. 277-288
-
-
Mittra, S.1
-
27
-
-
0033280699
-
Scalable multicast security in dynamic groups
-
(Singapore, Nov.). ACM, New York
-
MOLVA, R. AND PANNETRAT, A. 1999. Scalable multicast security in dynamic groups. In Proceedings of the 6th ACM Conference on Computer and Communications Security. (Singapore, Nov.). ACM, New York, 101-112.
-
(1999)
Proceedings of the 6th ACM Conference on Computer and Communications Security
, pp. 101-112
-
-
Molva, R.1
Pannetrat, A.2
-
28
-
-
0033356116
-
A survey of security issues in multcast communications
-
MOYER, M. J., RAO, J. R., AND ROHATGI, P. 1999. A survey of security issues in multcast communications. IEEE Netw. Mag. 13, 6 (Nov/Dec.), 12-23.
-
(1999)
IEEE Netw. Mag.
, vol.13
, Issue.6 NOV-DEC.
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
29
-
-
0005280428
-
Efficient collaborative key management protocols for secure autonomous group communication
-
Hong Kong, China, July. M. Blum and C H Lee, Eds. City University of Hong Kong Press, Hong Kong, - China
-
PERRIG, A. 1999. Efficient collaborative key management protocols for secure autonomous group communication. In Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC'99). (Hong Kong, China, July). M. Blum and C H Lee, Eds. City University of Hong Kong Press, Hong Kong, - China, pp. 192-202.
-
(1999)
Proceedings of the International Workshop on Cryptographic Techniques and E-Commerce (CrypTEC'99)
, pp. 192-202
-
-
Perrig, A.1
-
30
-
-
0034838199
-
ELK, A new protocol for efficient large-group key distribution
-
Oakland, Calif., May. IEEE Computer Society Press, Los Alamitos, Calif.
-
PERRIG, A., SONG, D., AND TYGAR, J. D. 2001. ELK, A new protocol for efficient large-group key distribution. In Proceedings of the IEEE Symposium on Security and Privacy. (Oakland, Calif., May). IEEE Computer Society Press, Los Alamitos, Calif.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
31
-
-
84948651208
-
Hydra: A decentralised group key management
-
A. Jacobs, Ed. Pittsburgh, Pa., June. IEEE Computer Society Press, Los Alamitos, Calif.
-
RAFAELI, S. AND HUTCHISON, D. 2002. Hydra: A decentralised group key management. In Proceedings of the 11th IEEE International WETICE: Enterprise Security Workshop, A. Jacobs, Ed. (Pittsburgh, Pa., June). IEEE Computer Society Press, Los Alamitos, Calif.
-
(2002)
Proceedings of the 11th IEEE International WETICE: Enterprise Security Workshop
-
-
Rafaeli, S.1
Hutchison, D.2
-
32
-
-
84867480504
-
EHBT: An efficient protocol for group key management
-
(London, U.K., Nov.). Lecture Notes in Computer Science,Springer-Verlag, New York Springer-Verlag.
-
RAFAELI, S., MATHY, L., AND HUTCHISON, D. 2001. EHBT: An efficient protocol for group key management. In Proceedings of the 3rd International Workshop on Networked Group Communications. (London, U.K., Nov.). Lecture Notes in Computer Science, vol. 2233. Springer-Verlag, New York, pp. 159-171. Springer-Verlag.
-
(2001)
Proceedings of the 3rd International Workshop on Networked Group Communications
, vol.2233
, pp. 159-171
-
-
Rafaeli, S.1
Mathy, L.2
Hutchison, D.3
-
34
-
-
85180743150
-
Optimized group rekey for group communication systems
-
San Diego, Calif., Feb.
-
RODEH, O., BIRMAN, K., AND DOLEV, D. 2000. Optimized group rekey for group communication systems. In Network and Distributed System Security. (San Diego, Calif., Feb.).
-
(2000)
Network and Distributed System Security
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
36
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
Oakland Calif., May. IEEE Computer Society Press, Los Alamitos, Calif.
-
SETIA, S., KOUSSIH, S., AND JAJODIA, S. 2000. Kronos: A scalable group re-keying approach for secure multicast. In Proceedings of the IEEE Symposium on Security and Privacy. (Oakland Calif., May). IEEE Computer Society Press, Los Alamitos, Calif.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
-
37
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
(New Delhi, India, Mar.). ACM, New York
-
STEINER, M., TSUDIK, G., AND WAIDNER, M. 1996. Diffie-Hellman key distribution extended to group communication. In SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security. (New Delhi, India, Mar.). ACM, New York, pp. 31-37.
-
(1996)
SIGSAC Proceedings of the 3rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
38
-
-
0000636954
-
The VersaKey frame-work: Versatile group key management
-
WALDVOGEL, M., CARONNI, G., SUN, D., WEILER, N., AND PLATTNER, B. 1999. The VersaKey frame-work: Versatile group key management. IEEE J. Sel. Areas Commun. (Special Issue on Middle-ware) 17, 9 (Aug.), 1614-1631.
-
(1999)
IEEE J. Sel. Areas Commun. (Special Issue on Middle-ware)
, vol.17
, Issue.9 AUG.
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
41
-
-
84950262904
-
SEMSOMM - A scalable multiple encryption scheme for one-to-many multicast
-
Cambridge, Mass., June. IEEE Computer Society Press, Los Alamitos, Calif.
-
WEILER, N. 2001. SEMSOMM - A scalable multiple encryption scheme for one-to-many multicast. In Proceedings of the 10th IEEE International WETICE Enterprises Security Workshop, (Cambridge, Mass., June). IEEE Computer Society Press, Los Alamitos, Calif.
-
(2001)
Proceedings of the 10th IEEE International WETICE Enterprises Security Workshop
-
-
Weiler, N.1
-
42
-
-
0033893174
-
Secure group communications using key graphs
-
WONG, C. K., GOUDA, M. G., AND LAM, S. S. 2000. Secure group communications using key graphs. IEEE I ACM Trans. Netw. 8, 1 (Feb.), 16-30.
-
(2000)
IEEE I ACM Trans. Netw.
, vol.8
, Issue.1 FEB.
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
|