-
1
-
-
0033356116
-
"A survey of security issues in multicast communications"
-
Nov.-Dec
-
M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol. 13, no. 6, pp. 12-23, Nov.-Dec. 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
2
-
-
0032661699
-
"Multicast security: A taxonomy and some efficient constructions"
-
R. Canetti, J. Garay, G. Itkis, D. Miccianancio, M. Naor, and B. Pinkas, "Multicast security: a taxonomy and some efficient constructions," in Proc. IEEE INFOCOM, 1999, pp. 708-716.
-
(1999)
Proc. IEEE INFOCOM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Miccianancio, D.4
Naor, M.5
Pinkas, B.6
-
3
-
-
0033893174
-
"Secure group communications using key graphs"
-
Feb
-
C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
4
-
-
0004135561
-
"Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization"
-
Internet Draft Report
-
D. Balenson, D. McGrew, and A. Sherman, "Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization," Internet Draft Report.
-
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
5
-
-
0036800721
-
"Scalable secure group communication over IP multicast"
-
Oct
-
S. Banerjee and B. Bhattacharjee, "Scalable secure group communication over IP multicast," IEEE J. Select. Areas Commun. - Special Issue on Network Support for Group Communication, vol. 20, no. 8, pp. 1511-1527, Oct. 2002.
-
(2002)
IEEE J. Select. Areas Commun. - Special Issue on Network Support for Group Communication
, vol.20
, Issue.8
, pp. 1511-1527
-
-
Banerjee, S.1
Bhattacharjee, B.2
-
6
-
-
0034849209
-
"Key distribution for secure multimedia multicasts via data embedding"
-
W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key distribution for secure multimedia multicasts via data embedding," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, 2001.
-
(2001)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
-
-
Trappe, W.1
Song, J.2
Poovendran, R.3
Liu, K.J.R.4
-
7
-
-
0000205020
-
"Efficient communication-storage tradeoffs for multicast encryption"
-
R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption," Eurocrypt, pp. 456-470, 1999.
-
(1999)
Eurocrypt
, pp. 456-470
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
8
-
-
0031641387
-
"Efficient security for large dynamic multicast groups"
-
(WET ICE '98)
-
G. Caronni, M. Waldvogel, D. Sun, and B. Plattner, "Efficient security for large dynamic multicast groups," in 7th Workshop on Enabling Technologies (WET ICE '98), 1998.
-
(1998)
7th Workshop on Enabling Technologies
-
-
Caronni, G.1
Waldvogel, M.2
Sun, D.3
Plattner, B.4
-
9
-
-
0017018484
-
"New directions in cryptography"
-
Nov
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
10
-
-
0020180459
-
"A conference key distribution system"
-
Sep
-
I. Ingemarsson, D. Tang, and C. Wong, "A conference key distribution system," IEEE Trans. Inform. Theory, vol. 28, no. 5, pp. 714-720, Sep. 1982.
-
(1982)
IEEE Trans. Inform. Theory
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
12
-
-
0029720059
-
"Diffie-Hellman key distribution extended to group communication"
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. 3rd ACM Conf. Computer Commun. Security, 1996, pp. 31-37.
-
(1996)
Proc. 3rd ACM Conf. Computer Commun. Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
14
-
-
0033748607
-
"New multiparty authentication services and key agreement protocols"
-
Apr
-
G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE J. Select. Areas Commun. vol. 18, no. 4, pp. 628-639, Apr. 2000.
-
(2000)
IEEE J. Select. Areas Commun.
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
15
-
-
85015402934
-
"Use of elliptic curves in cryptography"
-
V. Miller, "Use of elliptic curves in cryptography," in Advances in Cryptology: Crypto '85, 1986, pp. 417-426.
-
(1986)
Advances in Cryptology: Crypto '85
, pp. 417-426
-
-
Miller, V.1
-
16
-
-
0034449805
-
"Simple and fault-tolerant key agreement for dynamic collaborative groups"
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," in Proc. 7th ACM Conf. Computer Communication Security, 2000, pp. 235-244.
-
(2000)
Proc. 7th ACM Conf. Computer Communication Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
0033689166
-
"DISEC: A distributed framework for scalable secure many-to-many communication"
-
L. R. Dondeti, S. Mukherjee, and A. Samal, "DISEC: a distributed framework for scalable secure many-to-many communication," in Proc. 5th IEEE Symp. Computers and Communications, 2000, pp. 693-698.
-
(2000)
Proc. 5th IEEE Symp. Computers and Communications
, pp. 693-698
-
-
Dondeti, L.R.1
Mukherjee, S.2
Samal, A.3
-
18
-
-
15544383603
-
"Group key agreement using divide-and-conquer strategies"
-
presented at the The John's Hopkins University Conf. Information Sciences and Systems, Mar
-
W. Trappe, Y. Wang, and K. J. R. Liu, "Group key agreement using divide-and-conquer strategies," presented at the The John's Hopkins University Conf. Information Sciences and Systems, Mar. 2001.
-
(2001)
-
-
Trappe, W.1
Wang, Y.2
Liu, K.J.R.3
-
20
-
-
15544386715
-
-
Discrete-Time Signal Processing. Englewood Cliffs, NJ: Prentice-Hall
-
A. Oppenheim and R. Schafer, Discrete-Time Signal Processing. Englewood Cliffs, NJ: Prentice-Hall, 1989.
-
(1989)
-
-
Oppenheim, A.1
Schafer, R.2
-
21
-
-
0036738266
-
"SPINS: Security protocols for sensor networks"
-
A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, "SPINS: security protocols for sensor networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, D.3
Wen, V.4
Culler, D.5
-
23
-
-
84938015047
-
"A method for the construction of minimum redundancy codes"
-
D. Huffman, "A method for the construction of minimum redundancy codes," in Proc. Inst. Radio Eng., vol. 40, 1952, pp. 1098-1101.
-
(1952)
Proc. Inst. Radio Eng.
, vol.40
, pp. 1098-1101
-
-
Huffman, D.1
-
24
-
-
0006718744
-
"Practical length-limited coding for large alphabets"
-
A. Turping and A. Moffat, "Practical length-limited coding for large alphabets," Computer J., vol. 38, pp. 339-347, 1995.
-
(1995)
Computer J.
, vol.38
, pp. 339-347
-
-
Turping, A.1
Moffat, A.2
-
25
-
-
0025464931
-
"A fast algorithm for optimal length-limited Huffman codes"
-
Jul
-
L. Larmore and D. Hirschberg, "A fast algorithm for optimal length-limited Huffman codes," J. ACM, vol. 37, pp. 464-473, Jul. 1990.
-
(1990)
J. ACM
, vol.37
, pp. 464-473
-
-
Larmore, L.1
Hirschberg, D.2
-
26
-
-
0035183635
-
"The warm-up algorithm: A Lagrangian construction of length restricted Huffman codes"
-
R. Milidiu and E. Laber, "The warm-up algorithm: a Lagrangian construction of length restricted Huffman codes," SIAM J. Computation, vol. 30, pp. 1405-1426, 2000.
-
(2000)
SIAM J. Computation
, vol.30
, pp. 1405-1426
-
-
Milidiu, R.1
Laber, E.2
-
27
-
-
0000588430
-
"Discrete optimization via marginal analysis"
-
B. Fox, "Discrete optimization via marginal analysis," Manage. Sci. vol. 13, pp. 210-216, 1966.
-
(1966)
Manage. Sci.
, vol.13
, pp. 210-216
-
-
Fox, B.1
-
29
-
-
0036286367
-
"A time-efficient contributory key agreement scheme for secure group communication"
-
B. Sun, W. Trappe, Y. Sun, and K. J. R. Liu, "A time-efficient contributory key agreement scheme for secure group communication," in Proc. IEEE Int. Conf. Communications, vol. 2, 2002, pp. 1159-1163.
-
(2002)
Proc. IEEE Int. Conf. Communications
, vol.2
, pp. 1159-1163
-
-
Sun, B.1
Trappe, W.2
Sun, Y.3
Liu, K.J.R.4
-
31
-
-
0019183461
-
"On the word-length of Huffman codes"
-
T. Nemetz, "On the word-length of Huffman codes," Probl. Contr. Inform. Theory, vol. 9, pp. 231-242, 1980.
-
(1980)
Probl. Contr. Inform. Theory
, vol.9
, pp. 231-242
-
-
Nemetz, T.1
-
32
-
-
0015066917
-
"Codes based on inaccurate source probabilities"
-
May
-
E. Gilbert, "Codes based on inaccurate source probabilities," IEEE Trans. Inform. Theory, vol. 17, no. 3, pp. 304-314, May 1971.
-
(1971)
IEEE Trans. Inform. Theory
, vol.17
, Issue.3
, pp. 304-314
-
-
Gilbert, E.1
-
33
-
-
0003216056
-
"Tunstall adaptive coding and miscoding"
-
Nov
-
F. Fabris, A. Sgarro, and R. Pauletti, "Tunstall adaptive coding and miscoding," IEEE Trans. Inform. Theory, vol. 42, no. 6, pp. 2167-2180, Nov. 1996.
-
(1996)
IEEE Trans. Inform. Theory
, vol.42
, Issue.6
, pp. 2167-2180
-
-
Fabris, F.1
Sgarro, A.2
Pauletti, R.3
|