-
1
-
-
25144496231
-
NACK-oriented reliable multicast protocol (NORM)
-
draft-ietf-rmt-pi-norm-09, January
-
B. Adamson, C. Bormann, M. Handley, J. Macker, "NACK-Oriented Reliable Multicast Protocol (NORM)", RMT Working Group INTERNET-DRAFT, draft-ietf-rmt-pi-norm-09, January 2004.
-
(2004)
RMT Working Group Internet-draft
-
-
Adamson, B.1
Bormann, C.2
Handley, M.3
Macker, J.4
-
2
-
-
0001818392
-
Bimodal multicast
-
K. P. Birman, M. Hayden, O. Ozkasap, Z. Xiao, M. Budiu, and Y. Minsky, "Bimodal Multicast", ACM Transactions on Computer Systems, Vol. 17, No. 2, pp 41-88, 1999.
-
(1999)
ACM Transactions on Computer Systems
, vol.17
, Issue.2
, pp. 41-88
-
-
Birman, K.P.1
Hayden, M.2
Ozkasap, O.3
Xiao, Z.4
Budiu, M.5
Minsky, Y.6
-
3
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Eurocrypt'98, Springer-Verlag
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography", in Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1403
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
4
-
-
84948991087
-
A secure and efficient conference key distribution system
-
Extended Abstract
-
M. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System", (Extended Abstract), EUROCRYPT 1994: 275-286.
-
EUROCRYPT 1994
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
5
-
-
0031641387
-
Efficient security for large and dynamic groups
-
Cupertino, CA: IEEE Comp. Soc. Press
-
G. Caronni, M. Waldvogel, D. Sun, and B. Plattner, "Efficient security for large and dynamic groups," in Proceedings of the 7th Workshop Enabling Technologies, Cupertino, CA: IEEE Comp. Soc. Press, 1998.
-
(1998)
Proceedings of the 7th Workshop Enabling Technologies
-
-
Caronni, G.1
Waldvogel, M.2
Sun, D.3
Plattner, B.4
-
6
-
-
26844552036
-
-
Carnegie Mellon Software Engineering Institute, May
-
CERT E-crime Watch Survey. Carnegie Mellon Software Engineering Institute, May 2004. http://www.cert.org/about/ecrime.html
-
(2004)
CERT E-crime Watch Survey
-
-
-
7
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on the discrete logarithm
-
T. E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm", IEEE Transactions of Information Theory, 31(4): 469-472, 1985.
-
(1985)
IEEE Transactions of Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Gamal, T.E.1
-
11
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
M. Mambo and E. Okamoto, "Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts", IEICE Transactions on Fundamentals, vol. E80-A, No. 1, 1997.
-
(1997)
IEICE Transactions on Fundamentals
, vol.E80-A
, Issue.1
-
-
Mambo, M.1
Okamoto, E.2
-
12
-
-
0003396988
-
-
draft-irtf-smug-key-tree-balance-00.txt, IETF Secure Multicast Group, June
-
M. Moyer, J. Rao, and P. Rohatgi, "Maintaining Balanced Key Trees for Secure Multicast", draft-irtf-smug-key-tree-balance-00.txt, IETF Secure Multicast Group, June 1999.
-
(1999)
Maintaining Balanced Key Trees for Secure Multicast
-
-
Moyer, M.1
Rao, J.2
Rohatgi, P.3
-
13
-
-
0345565893
-
A survey of key management for secure group communication
-
September
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication", ACM Computing Surveys, Vol.35, No.3, September 2003, pp. 309-329.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
14
-
-
0032114960
-
Building adaptive systems using ensemble
-
August
-
R. V. Renesse, K. P. Birman, M. Hayden, A. Vaysburd, and D, Karr, "Building adaptive systems using ensemble," Software-Practice and Experience Vol28, No. 9, pp, 963-979, August 1998.
-
(1998)
Software-practice and Experience
, vol.28
, Issue.9
, pp. 963-979
-
-
Renesse, R.V.1
Birman, K.P.2
Hayden, M.3
Vaysburd, A.4
Karr, D.5
-
16
-
-
0033690786
-
Kronos: A scalable group rekeying approach for secure multicast
-
S. Setia, S. Koussih, S. Jajodia and E. Harder, "Kronos: A Scalable Group ReKeying Approach for Secure Multicast", in Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 215-228, 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 215-228
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
18
-
-
0002805974
-
A secure audio teleconference system
-
D. Steer, L. Strawczynski, W. Diffie, and M. Wiener, "A secure audio teleconference system", in CRYPTO '88, 1988.
-
(1988)
CRYPTO '88
-
-
Steer, D.1
Strawczynski, L.2
Diffie, W.3
Wiener, M.4
-
19
-
-
0000636954
-
The versakey framework: Versatile group key management
-
September
-
M. Waldvogel, G. Caronni, D. Sun, N. Weiler, and B. Plattner, "The VersaKey Framework: Versatile Group Key Management", IEEE Journal on Selected Areas in Communications, 17(9),pp: 1614-1631, September 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
20
-
-
0003657439
-
Key management for multicast: Issues and architectures
-
September
-
D. Wallner, E. Harder, and R. Agee, "Key Management for Multicast: Issues and Architectures", Internet-draft, September 1998.
-
(1998)
Internet-draft
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
21
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, S. S. Lam, "Secure group communications using key graphs", IEEE/ACM Transactions on Networking 8(1): 16-30, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
22
-
-
0347946946
-
Protocol design for scalable and reliable group rekeying
-
X. B. Zhang, S. S. Lam, D.-Y. Lee, Y. R. Yang, "Protocol design for scalable and reliable group rekeying", IEEE/ACM Transactions on Networking, 11(6): 908-922, 2003.
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.6
, pp. 908-922
-
-
Zhang, X.B.1
Lam, S.S.2
Lee, D.-Y.3
Yang, Y.R.4
-
24
-
-
35048843538
-
Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast
-
S. Zhu, S. Setia, S. Jajodia, "Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast", in Proc. of Networked Group Communication Conference, 2003.
-
(2003)
Proc. of Networked Group Communication Conference
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
|