-
1
-
-
0038318458
-
Logical key hierarchy protocol
-
draft-harney-sparta-lkhp-sec-00.txt
-
H. Harney, E. Harder, Logical key hierarchy protocol, Internet draft, draft-harney-sparta-lkhp-sec-00.txt, 1999
-
(1999)
Internet Draft
-
-
Harney, H.1
Harder, E.2
-
3
-
-
1642361005
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
draft-balenson-groupkeymgmt-oft-00.txt
-
D. Balenson, D. McGrew, A. Sherman, Key management for large dynamic groups: one-way function trees and amortized initialization, Internet draft, draft-balenson-groupkeymgmt-oft-00.txt, 1999
-
(1999)
Internet Draft
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
4
-
-
0141538021
-
Efficient and secure key management for wireless mobile communications
-
R. Di Pietro, L.V. Mancini, S. Jajodia, Efficient and secure key management for wireless mobile communications, in: Proceedings of the Second ACM International Workshop on Principles of Mobile Computing, 2002, pp. 66-73
-
(2002)
Proceedings of the Second ACM International Workshop on Principles of Mobile Computing
, pp. 66-73
-
-
Di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
5
-
-
0347946946
-
Protocol designs for scalable and reliable group rekeying
-
Z. Brian, S. Simon, D.Y. Lee, and Y. Richard Protocol designs for scalable and reliable group rekeying IEEE/ACM Transactions on Networking 11 6 2003 908 922
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.6
, pp. 908-922
-
-
Brian, Z.1
Simon, S.2
Lee, D.Y.3
Richard, Y.4
-
6
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
Advances in Cryptology EUROCRYPT'99 Springer-Verlag
-
R. Canetti, T. Malkin, K. Nissim, Efficient communication-storage tradeoffs for multicast encryption, in: Advances in Cryptology EUROCRYPT'99, in: LNCS, vol. 1599, Springer-Verlag, pp. 459-474
-
LNCS
, vol.1599
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
8
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra Iolus: a framework for scalable secure multicasting ACM Computer Communication Review 27 4 1997 227 288
-
(1997)
ACM Computer Communication Review
, vol.27
, Issue.4
, pp. 227-288
-
-
Mittra, S.1
-
10
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
S. Setia, S. Koussih, S. Jajodia, Kronos: a scalable group re-keying approach for secure multicast, in: Proc 21st IEEE Symposium on Security and Privacy, 2000, pp. 215-228
-
(2000)
Proc 21st IEEE Symposium on Security and Privacy
, pp. 215-228
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
-
12
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems 1 3 1983 239 248
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
13
-
-
0031344109
-
Dynamic key management scheme for access control in a hierarchy
-
C.H. Lin Dynamic key management scheme for access control in a hierarchy Computer Communications 20 15 1997 1381 1385
-
(1997)
Computer Communications
, vol.20
, Issue.15
, pp. 1381-1385
-
-
Lin, C.H.1
-
14
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W.G. Tzeng A time-bound cryptographic key assignment scheme for access control in a hierarchy IEEE Transactions on Knowledge and Data Engineering 14 1 2002 182 188
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.G.1
-
15
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
C.C. Chang, and R.J. Hwang Cryptographic key assignment scheme for access control in a hierarchy Information Systems 17 3 1992 243 247
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
-
16
-
-
0029219476
-
A new public-key cipher system based upon the Diophantine equations
-
C.H. Lin, C. Chang, and R.C. Lee A new public-key cipher system based upon the Diophantine equations IEEE Transactions on Computers 44 1 1995 13 19
-
(1995)
IEEE Transactions on Computers
, vol.44
, Issue.1
, pp. 13-19
-
-
Lin, C.H.1
Chang, C.2
Lee, R.C.3
-
17
-
-
3042635438
-
Secret sharing with access structures in a hierarchy
-
C.C. Chang, C.H. Lin, W. Lee, P.C. Hwang, Secret sharing with access structures in a hierarchy, in: Proceedings of the 18th International Conference on Advanced Information Networking and Application, AINA'04, 2004, pp. 31-34
-
(2004)
Proceedings of the 18th International Conference on Advanced Information Networking and Application, AINA'04
, pp. 31-34
-
-
Chang, C.C.1
Lin, C.H.2
Lee, W.3
Hwang, P.C.4
-
18
-
-
0036929565
-
Secure multicast in wireless networks of mobile hosts: Protocols and issues
-
Kluwer Academic Publishers
-
D. Bruschi, and E. Rosti Secure multicast in wireless networks of mobile hosts: protocols and issues Mobile Networks and Applications vol. 7 2002 Kluwer Academic Publishers 503 511
-
(2002)
Mobile Networks and Applications
, vol.7
, pp. 503-511
-
-
Bruschi, D.1
Rosti, E.2
-
19
-
-
0032628551
-
A conference key distribution scheme based on the theory of quadratic residues
-
K.J. Tan, and H.W. Zhu A conference key distribution scheme based on the theory of quadratic residues Computer Communications 22 8 1999 735 738
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 735-738
-
-
Tan, K.J.1
Zhu, H.W.2
-
20
-
-
1642403770
-
Comparison of inter-area re-keying algorithms for secure wireless group communications
-
C. Zhang, B. Decleene, J. Kurose, and D. Towsley Comparison of inter-area re-keying algorithms for secure wireless group communications Performance Evaluation 49 2002 1 20
-
(2002)
Performance Evaluation
, vol.49
, pp. 1-20
-
-
Zhang, C.1
Decleene, B.2
Kurose, J.3
Towsley, D.4
-
21
-
-
0032638189
-
Comments on 'dynamic key management schemes for access control in a hierarchy'
-
N. Lee, and T. Hwang Comments on 'dynamic key management schemes for access control in a hierarchy' Computer Communications 22 1 1999 87 89
-
(1999)
Computer Communications
, vol.22
, Issue.1
, pp. 87-89
-
-
Lee, N.1
Hwang, T.2
-
22
-
-
0345565893
-
A survey of key management for secure group communication
-
R. Sandro, and H. David A survey of key management for secure group communication ACM Computing Surveys 35 3 2003 309 329
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Sandro, R.1
David, H.2
|