메뉴 건너뛰기




Volumn 7, Issue 1, 2004, Pages 60-96

Tree-based group key agreement

Author keywords

Communication complexity; Cryptographic protocols; Group communication; Group key agreement; Security

Indexed keywords

COMMUNICATION COMPLEXITY; CRYPTOGRAPHIC PROTOCOLS; GROUP COMMUNICATION; GROUP KEY AGREEMENTS; SECURITY; TREE-BASED GROUP DIFFLE-HELLMAN (TGDH);

EID: 3142512728     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/984334.984337     Document Type: Article
Times cited : (427)

References (38)
  • 5
    • 0041656915 scopus 로고    scopus 로고
    • Key-agreement in ad-hoc networks
    • ASOKAN, N. AND GINZBOORG, P. 1999. Key-agreement in ad-hoc networks. In Nordsec'99.
    • (1999) Nordsec'99
    • Asokan, N.1    Ginzboorg, P.2
  • 14
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • final version of the Proceedings
    • BURMESTER, M. AND DESMEDT, Y. 1995. A secure and efficient conference key distribution system. In Advances in Cryptology - EUROCRYPT'94, 275-286 (final version of the Proceedings).
    • (1995) Advances in Cryptology - EUROCRYPT'94 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 18
    • 0030703867 scopus 로고    scopus 로고
    • Specifying and using a pardonable group communication service
    • FEKETE, A., LYNCH, N., AND SHVARTSMAN, A. 1997. Specifying and using a pardonable group communication service. In ACM PODC'97, 53-62.
    • (1997) ACM PODC'97 , pp. 53-62
    • Fekete, A.1    Lynch, N.2    Shvartsman, A.3
  • 27
    • 3142581505 scopus 로고    scopus 로고
    • OPENSSL PROJECT TEAM. 2001. Openssl
    • OPENSSL PROJECT TEAM. 2001. Openssl.
  • 29
    • 85180743150 scopus 로고    scopus 로고
    • Optimized rekey for group communication systems
    • RODEH, O., BIRMAN, K., AND DOLEV, D. 2000. Optimized rekey for group communication systems. In NDSS2000, 37-48.
    • (2000) NDSS2000 , pp. 37-48
    • Rodeh, O.1    Birman, K.2    Dolev, D.3
  • 30
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • SHOUP, V. 1997. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology - EUROCRYPT'97, 256-266.
    • (1997) Advances in Cryptology - EUROCRYPT'97 , pp. 256-266
    • Shoup, V.1
  • 31
    • 84948976239 scopus 로고    scopus 로고
    • Using hash functions as a hedge against chosen ciphertext attacks
    • SHOUP, V. 2000. Using hash functions as a hedge against chosen ciphertext attacks. In Advances in Cryptology - EUROCRYPT'2000, 275-288.
    • (2000) Advances in Cryptology - EUROCRYPT'2000 , pp. 275-288
    • Shoup, V.1
  • 37
    • 0032178082 scopus 로고    scopus 로고
    • Appeared in, (Oct.)
    • WONG, C., GOUDA, M., AND LAM, S. 1998. Secure group communications using key graphs. In Proceedings of the ACM SIGCOMM'98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 68-79. Appeared in ACM SIGCOMM Computer Communication Review 28, 4 (Oct. 1998).
    • (1998) ACM SIGCOMM Computer Communication Review , vol.28 , Issue.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.