-
1
-
-
84956868427
-
A quick group key distribution scheme with entity revocation
-
Heidelberg, Germany: Springer-Verlag
-
J. Anzai, N. Matsuzaki, and T. Matsumoto, "A quick group key distribution scheme with entity revocation," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1716, pp. 333-347.
-
(1999)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
2
-
-
84957656774
-
MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences
-
B. Briscoe, "MARKS: zero side effect multicast key management using arbitrarily revealed key sequences," in Proc. 1st Int. Workshop Networked Group Communication (NGC'99), pp. 301-320.
-
Proc. 1st Int. Workshop Networked Group Communication (NGC'99)
, pp. 301-320
-
-
Briscoe, B.1
-
3
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: a taxonomy and some efficient constructions," in Proc. INFOCOM '99, vol. 2, pp. 708-716.
-
Proc. INFOCOM '99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
5
-
-
84979291225
-
Broadcast encryption
-
Heidelberg, Germany: Springer-Verlag
-
A. Fiat and M. Naor, "Broadcast encryption," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1994, vol. 773, pp. 480-491.
-
(1994)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
6
-
-
0022793132
-
How to construct random functions
-
O. Goldreich, S. Goldwasser, and S. Micali, "How to construct random functions," J. ACM, vol. 33, no. 4, pp. 792-807, 1986.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
7
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Heidelberg, Germany: Springer-Verlag
-
R. Kumar, S. Rajagopalan, and A. Sahai, "Coding constructions for blacklisting problems without computational assumptions," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1999, vol. 1666, pp. 609-623.
-
(1999)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
8
-
-
0003984462
-
-
Princeton, NJ: Princeton Univ. Press, Princeton Computer Science Notes
-
M. Luby, Pseudorandomness and Cryptographic Applications. Princeton, NJ: Princeton Univ. Press, 1996, Princeton Computer Science Notes.
-
(1996)
Pseudorandomness and Cryptographic Applications
-
-
Luby, M.1
-
9
-
-
84957696450
-
Combinatorial bounds for broadcast encryption
-
Heidelberg, Germany: Springer-Verlag
-
M. Luby and J. Staddon, "Combinatorial bounds for broadcast encryption," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 1998, vol. 1403, pp. 512-526.
-
(1998)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
10
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Heidelberg, Germany: Springer-Verlag
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in Lecture Notes in Computer Science, Advances in Cryptology. Heidelberg, Germany: Springer-Verlag, 2001, vol. 2139, pp. 41-62.
-
(2001)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
11
-
-
0038043478
-
Key establishment in large groups using one-way function trees
-
May
-
D. McGrew and A. T. Sherman, "Key establishment in large groups using one-way function trees," IEEE Trans. Software Eng., vol. 29, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Software Eng.
, vol.29
, pp. 444-458
-
-
McGrew, D.1
Sherman, A.T.2
-
15
-
-
0000636954
-
The VersaKey framework: Versatile group key management
-
Sept.
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The VersaKey framework: versatile group key management," IEEE J. Select. Areas Commun., vol. 17, pp. 1614-1631, Sept. 1999.
-
(1999)
IEEE J. Select. Areas Commun.
, vol.17
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
16
-
-
0003259063
-
Key management for multicast: Issues and architecture
-
Network Working Group, June
-
D. M. Wallner, E. Harder, and R. C. Agee, "Key management for multicast: Issues and architecture," Network Working Group, RFC 2627, June 1999.
-
(1999)
RFC
, vol.2627
-
-
Wallner, D.M.1
Harder, E.2
Agee, R.C.3
-
18
-
-
84975035144
-
Key management for encrypted broadcast
-
A. Wool, "Key management for encrypted broadcast," ACM Trans. Inf. Syst. Security, vol. 3, no. 2, pp. 107-134, 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.2
, pp. 107-134
-
-
Wool, A.1
|