-
2
-
-
3042591113
-
Group key management architecture
-
Mar. draft-ietfmsec-gkmarch-04. txt
-
M. Baugher, R. Canetti, L. Dondeti, and F. Lindholm, "Group key management architecture," INTERNET-DRAFT, Mar. 2003, draft-ietfmsec-gkmarch-04.txt.
-
(2003)
INTERNET-DRAFT
-
-
Baugher, M.1
Canetti, R.2
Dondeti, L.3
Lindholm, F.4
-
3
-
-
0003657439
-
Key management for multicast: Issues and architectures
-
Sept.
-
D. Wallner, E. Jarder, and R. Agee, "Key management for multicast: Issues and architectures," INTERNET-DRAFT, Sept. 1998.
-
(1998)
INTERNET-DRAFT
-
-
Wallner, D.1
Jarder, E.2
Agee, R.3
-
4
-
-
0003557429
-
Key establishment in large dynamic groups using one-way function trees
-
Inc, Glenwood, MD, Technical Report No. 0755, May
-
D. A. McGrew and A. T. Sherman, "Key establishment in large dynamic groups using one-way function trees," TIS Labs at Network Associates, Inc, Glenwood, MD, Technical Report No. 0755, May 1998.
-
(1998)
TIS Labs at Network Associates
-
-
McGrew, D.A.1
Sherman, A.T.2
-
5
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
LNCS
-
D. Naor, M. Naor, and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," Advances in Cryptology-CRYPTO '01, LNCS, vol. 2139, pp. 41-62, 2001.
-
(2001)
Advances in Cryptology-CRYPTO '01
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
6
-
-
0034780938
-
Reliable group rekeying: A performance analysis
-
San Diego, California: ACM Press, Aug.
-
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: a performance analysis," in Proceedings of the ACM SIGCOMM '01". San Diego, California: ACM Press, Aug. 2001, pp. 27-38.
-
(2001)
Proceedings of the ACM SIGCOMM '01
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
8
-
-
0034238689
-
Key management for restricted multicast using broadcast encryption
-
August
-
M. Abdalla, Y. Shavitt, and A. Wool, "Key management for restricted multicast using broadcast encryption," IEEE/ACM Transactions on Networking (TON), vol. 8, no. 4, pp. 443-454, August 2000.
-
(2000)
IEEE/ACM Transactions on Networking (TON)
, vol.8
, Issue.4
, pp. 443-454
-
-
Abdalla, M.1
Shavitt, Y.2
Wool, A.3
-
9
-
-
84952354621
-
The multicast security (msec) architecture
-
Nov. draft-ietf-msec-arch-00. txt
-
T. Hardjono and B. Weis, "The multicast security (msec) architecture," INTERNET-DRAFT, Nov. 2002, draft-ietf-msec-arch-00.txt.
-
(2002)
INTERNET-DRAFT
-
-
Hardjono, T.1
Weis, B.2
-
10
-
-
0032178082
-
Secure group communications using key graphs
-
Sept.
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proceedings of the ACM SIGCOMM '98, Sept. 1998, pp. 68-79.
-
(1998)
Proceedings of the ACM SIGCOMM '98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
11
-
-
0006513010
-
-
The University of Texas at Austin, Technical Report TR-01-21, June
-
Y. R. Yang, X. S. Li, X. B. Zhang, and S. S. Lam, "Reliable group rekeying: A performance analysis," The University of Texas at Austin, Technical Report TR-01-21, June 2001.
-
(2001)
Reliable Group Rekeying: A Performance Analysis
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
12
-
-
0035167268
-
Protocol design for scalable and reliable group rekeying
-
Denver, CO, Aug.
-
X. Zhang, S. Lam, D. Lee, and Y. Yang, "Protocol design for scalable and reliable group rekeying," in Proceedings of SPIE Conference on Sealability and Traffic Control in IP Networks, Denver, CO, Aug. 2001.
-
(2001)
Proceedings of SPIE Conference on Sealability and Traffic Control in IP Networks
-
-
Zhang, X.1
Lam, S.2
Lee, D.3
Yang, Y.4
-
14
-
-
0033690786
-
Kronos: A scalable group rekeying approach for secure multicast
-
Berkeley, CA
-
S. J. S. Setia, S. Koussih and E. Harder, "Kronos: A scalable group rekeying approach for secure multicast," in IEEE Symposium on Security and Privacy, Berkeley, CA, 2000, pp. 215-228.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 215-228
-
-
Setia, S.J.S.1
Koussih, S.2
Harder, E.3
|