메뉴 건너뛰기




Volumn 3421, Issue II, 2005, Pages 662-672

Scalable group key management with partially trusted controllers

Author keywords

[No Author keywords available]

Indexed keywords

DATA COMMUNICATION SYSTEMS; INTERNET; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 26844522840     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31957-3_75     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Eurocrypt'98, Springer-Verlag
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography", in Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1403
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 84948991087 scopus 로고    scopus 로고
    • A secure and efficient conference key distribution system
    • Extended Abstract
    • M. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System", (Extended Abstract), EUROCRYPT 1994: 275-286.
    • EUROCRYPT 1994 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 6
    • 26844552036 scopus 로고    scopus 로고
    • Carnegie Mellon Software Engineering Institute, May
    • CERT E-crime Watch Survey. Carnegie Mellon Software Engineering Institute, May 2004. http://www.cert.org/about/ecrime.html
    • (2004) CERT E-crime Watch Survey
  • 7
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on the discrete logarithm
    • T. E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm", IEEE Transactions of Information Theory, 31(4): 469-472, 1985.
    • (1985) IEEE Transactions of Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1
  • 11
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • M. Mambo and E. Okamoto, "Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts", IEICE Transactions on Fundamentals, vol. E80-A, No. 1, 1997.
    • (1997) IEICE Transactions on Fundamentals , vol.E80-A , Issue.1
    • Mambo, M.1    Okamoto, E.2
  • 13
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • September
    • S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication", ACM Computing Surveys, Vol.35, No.3, September 2003, pp. 309-329.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 20
    • 0003657439 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • September
    • D. Wallner, E. Harder, and R. Agee, "Key Management for Multicast: Issues and Architectures", Internet-draft, September 1998.
    • (1998) Internet-draft
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 24
    • 35048843538 scopus 로고    scopus 로고
    • Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast
    • S. Zhu, S. Setia, S. Jajodia, "Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast", in Proc. of Networked Group Communication Conference, 2003.
    • (2003) Proc. of Networked Group Communication Conference
    • Zhu, S.1    Setia, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.