-
1
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
2
-
-
84945118556
-
Lower bounds for multicast message authentication
-
B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May Springer-Verlag
-
D. Boneh, G. Durfee, and M. Franklin. Lower bounds for multicast message authentication. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 2045 of Lecture Notes in Computer Science, pages 437-452, Innsbruck, Austria, May 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 437-452
-
-
Boneh, D.1
Durfee, G.2
Franklin, M.3
-
3
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York, NY, Mar. IEEE
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In INFOCOM 1999. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, volume 2, pages 708-716, New York, NY, Mar. 1999. IEEE.
-
(1999)
INFOCOM 1999. Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
4
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May Springer-Verlag
-
R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 1592 of Lecture Notes in Computer Science, Prague, Czech Republic, May 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
6
-
-
84979291225
-
Broadcast encryption
-
D. R. Stinson, editor, Advances in Cryptology- CRYPTO '93, Proceedings of the 13th annual international Cryptology conference, Santa Barbara, California, USA, Aug. Springer-Verlag
-
A. Fiat and M. Naor. Broadcast encryption. In D. R. Stinson, editor, Advances in Cryptology- CRYPTO '93, Proceedings of the 13th annual international Cryptology conference, volume 773 of Lecture Notes in Computer Science, pages 480-491, Santa Barbara, California, USA, Aug. 1993. Springer-Verlag.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
84957696450
-
Combinatorial Bounds for Broadcast Encryption
-
K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May Springer-Verlag
-
M. Luby and J. Staddon. Combinatorial Bounds for Broadcast Encryption. In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, volume 1403 of Lecture Notes in Computer Science, pages 512-526, Espoo, Finland, May 1998. Springer-Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
12
-
-
0344875571
-
Completeness theorems for the abadi-rogaway logic of encrypted expressions
-
Preliminary version in WITS 2002
-
D. Micciancio and B. Warinschi. Completeness theorems for the abadi-rogaway logic of encrypted expressions. Journal of Computer Security, 12(1):99-129, 2004. Preliminary version in WITS 2002.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 99-129
-
-
Micciancio, D.1
Warinschi, B.2
-
13
-
-
0034838199
-
ELK, A New Protocol for Efficient LargeGroup Key Distribution
-
Oakland, CA, USA, May IEEE
-
A. Perrig, D. X. Song, and J. D. Tygar. ELK, A New Protocol for Efficient LargeGroup Key Distribution. In IEEE Symposium on Security and Privacy, pages 247-262, Oakland, CA, USA, May 2001. IEEE.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.X.2
Tygar, J.D.3
-
14
-
-
0035001560
-
A lower bound for multicast key distribution
-
New York, NY, Apr. IEEE
-
J. Snoeyink, S. Suri, and G. Varghese. A lower bound for multicast key distribution. In INFOCOM 2001. Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, volume 1, pages 422-431, New York, NY, Apr. 2001. IEEE.
-
(2001)
INFOCOM 2001. Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.1
, pp. 422-431
-
-
Snoeyink, J.1
Suri, S.2
Varghese, G.3
-
16
-
-
0033893174
-
Secure group communications using key graphs
-
Feb. Preliminary version in SIGCOMM 1998
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, Feb. 2000. Preliminary version in SIGCOMM 1998.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|