-
2
-
-
84955614214
-
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
-
C. Blundo, L. F. Mattos, and D. Stinson. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Advances in Cryptology - CRYPTO '96, LNCS 1109, pages 387-400, 1996.
-
(1996)
Advances in Cryptology - CRYPTO '96, LNCS
, vol.1109
, pp. 387-400
-
-
Blundo, C.1
Mattos, L.F.2
Stinson, D.3
-
3
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. In Advances in Cryptology - Eurocrypt '99, LNCS 1592, pages 459-474, 1999.
-
(1999)
Advances in Cryptology - Eurocrypt '99, LNCS
, vol.1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
7
-
-
0343017090
-
On key distribution via true broadcasting
-
M. Just, E. Kranakis, D. Krizanc, and P. van Oorschot. On key distribution via true broadcasting. In ACM Conference on Computer and Communications Security, pages 81-88, 1994.
-
(1994)
ACM Conference on Computer and Communications Security
, pp. 81-88
-
-
Just, M.1
Kranakis, E.2
Krizanc, D.3
Van Oorschot, P.4
-
8
-
-
84958986237
-
Key management for secure multicast with dynamic controllers
-
H. Kurnio, R. Safavi-Naini, W. Susilo, and H. Wang. Key management for secure multicast with dynamic controllers. In Fifth Australasian Conference on Information Security and Privacy, pages 178-190, 2000.
-
(2000)
Fifth Australasian Conference on Information Security and Privacy
, pp. 178-190
-
-
Kurnio, H.1
Safavi-Naini, R.2
Susilo, W.3
Wang, H.4
-
9
-
-
26444491036
-
Efficient and self-healing key distribution with revocation for tactical wireless networks
-
D. Liu and P. Ning. Efficient and self-healing key distribution with revocation for tactical wireless networks. In ACM Conference on Computer and Communications Security, 2003.
-
(2003)
ACM Conference on Computer and Communications Security
-
-
Liu, D.1
Ning, P.2
-
10
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
D. McGrew and A. Sherman. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5):444-458, May 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
McGrew, D.1
Sherman, A.2
-
12
-
-
84944319284
-
Efficient trace and revoke schemes
-
M. Naor and B. Pinkas. Efficient trace and revoke schemes. In Financial Cryptography, LNCS 1962, pages 1-20, 2001.
-
(2001)
Financial Cryptography, LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
13
-
-
0034838199
-
Elk, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and J. D. Tygar. Elk, a new protocol for efficient large-group key distribution. In IEEE Symposium on Security and Privacy, pages 247-262, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
15
-
-
0036086453
-
Self-healing key distribution with revocation
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean. Self-healing key distribution with revocation. In Proceedings of IEEE Symposium on Security and Privacy, pages 241-257, 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 241-257
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
16
-
-
0003657439
-
Key management for multicast: Issues and architectures
-
Work in Progress
-
D. Wallner, E. Harder, and E. Agee. Key management for multicast: Issues and architectures. In Internet Draft (work in progress), 1998.
-
(1998)
Internet Draft
-
-
Wallner, D.1
Harder, E.2
Agee, E.3
-
17
-
-
0032178082
-
Secure group communication using key graphs
-
C. Wong, M. Gouda, and S. Lam. Secure group communication using key graphs. In SIGCOMM '98, pages 68-79, 1998.
-
(1998)
SIGCOMM '98
, pp. 68-79
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
|