-
1
-
-
84979291225
-
Broadcast encryption
-
Springer-Verlag
-
A. Fiat, M. Noar, "Broadcast Encryption," Lecture Notes in Computer Science, Advances in Cryptology, Springer-Verlag, 773, pp 480-491, 1994.
-
(1994)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Noar, M.2
-
2
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
R. Canetti, T. Malkin, K. Nissin, "Efficient Communication-Storage Tradeoffs for Multicast Encryption," EUROCRYPT 1999, pp 459-474.
-
EUROCRYPT 1999
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissin, K.3
-
3
-
-
15244342998
-
Revocation and tracing routines for stateless receivers
-
Springer-Verlag
-
D. Noar, M. Noar, J. Lotspiech, "Revocation and Tracing Routines for Stateless Receivers," Lecture Notes in Computer Science, Advances in Cryptology, Springer-Verlag, 2139, 2001.
-
(2001)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.2139
-
-
Noar, D.1
Noar, M.2
Lotspiech, J.3
-
4
-
-
14844326195
-
The LSD broadcast encryption scheme
-
Santa Barbara, California, USA, August 18-22
-
D. Halevy, A. Shamir, "The LSD Broadcast Encryption Scheme," Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002.
-
(2002)
Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference
-
-
Halevy, D.1
Shamir, A.2
-
5
-
-
0032178082
-
Secure group communications using key graphs
-
C.K. Wong, M. Gouda, S. Lam, "Secure Group Communications using Key Graphs," Proceedings of SIGCOMM 98, pp 68-79, 1998.
-
(1998)
Proceedings of SIGCOMM 98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
-
6
-
-
15244345773
-
Anonymous trust: Digital rights management using broadcast encryption
-
J. Lotspiech, S. Nusser, F. Pestonoi, "Anonymous Trust: Digital Rights Management using Broadcast Encryption," Proceedings of the IEEE, 92 (6), pp 898-909, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 898-909
-
-
Lotspiech, J.1
Nusser, S.2
Pestonoi, F.3
-
7
-
-
0003427389
-
Efficient methods for integrating traceability and broadcast encryption
-
Santa Barbara, California, USA, August
-
Eli Gafni A1, Jessica Staddon A2, Yiqun Lisa Yin, "Efficient Methods for Integrating Traceability and Broadcast Encryption," Advances in Cryptology - CRYPTO'99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 1999.
-
(1999)
Advances in Cryptology - CRYPTO'99: 19th Annual International Cryptology Conference
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
9
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Communications of the ACM, 21(12), December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
10
-
-
0020890723
-
Non-public key distribution
-
R. Blom, "Non-Public Key Distribution" CRYPTO 1982, pp 231-236, 1982.
-
(1982)
CRYPTO 1982
, pp. 231-236
-
-
Blom, R.1
-
11
-
-
0025212474
-
A matrix key distribution scheme
-
L. Gong, D.J. Wheeler, "A Matrix Key Distribution Scheme," Journal of Cryptology, 2(2), pp 51-59, 1990.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
13
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
P. Erdos, P. Frankl, Z. Furedi, "Families of Finite Sets in which no Set is Covered by the Union of r Others," Isreal Journal of Mathematics, 51, pp 79-89, 1985.
-
(1985)
Isreal Journal of Mathematics
, vol.51
, pp. 79-89
-
-
Erdos, P.1
Frankl, P.2
Furedi, Z.3
-
14
-
-
0029362456
-
On key storage in secure networks
-
M. Dyer, T. Fenner, A. Frieze and A. Thomason, "On Key Storage in Secure Networks," Journal of Cryptology, 8, 189-200, 1995.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
15
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington DC, Nov
-
L. Eschenauer, V.D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington DC, pp 41-47, Nov 2002.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
16
-
-
0038487088
-
Random key pre-distribution schemes for sensor networks
-
Berkeley, California, May
-
H. Chan, A. Perrig, D. Song, "Random Key Pre-distribution Schemes for Sensor Networks," IEEE Symposium on Security and Privacy, Berkeley, California, May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
18
-
-
84943553152
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
Atlanta, Georgia, November 4-7
-
S. Zhu, S. Xu, S. Setia S. Jajodia, "Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach," Proc. of the 11th IEEE International Conference on Network Protocols (ICNP'03), Atlanta, Georgia, November 4-7, 2003.
-
(2003)
Proc. of the 11th IEEE International Conference on Network Protocols (ICNP'03)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
19
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y.S. Han, P.K.Varshney, "A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks," Proceedings of the 10th ACM Conference on Computer and Communication Security, pp 42-51, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
21
-
-
85163609944
-
Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
-
M. Ramkumar, N. Memon, R. Simha, "Pre-Loaded Key Based Multicast and Broadcast Authentication in Mobile Ad-Hoc Networks," Globecom-2003.
-
Globecom-2003
-
-
Ramkumar, M.1
Memon, N.2
Simha, R.3
-
24
-
-
0013427153
-
Probabilistic methods in external finite set theory
-
N. Alon, "Probabilistic Methods in External Finite Set Theory," in Extremal Problems for Finite Sets, pp 39-57, 1991.
-
(1991)
Extremal Problems for Finite Sets
, pp. 39-57
-
-
Alon, N.1
-
25
-
-
0032661699
-
Multicast security. A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, "Multicast Security. A Taxonomy and Some Efficient Constructions," INFOCOMM'99, 1999.
-
(1999)
INFOCOMM'99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
26
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport, "Password Authentication with Insecure Communication," Communications of the ACM, 24(11):770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
27
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
San Diego, California, December
-
S. Cheung, "An Efficient Message Authentication Scheme for Link State Routing", Proceedings of the 13th Annual Computer Security Applications Conference, San Diego, California, December 1997, pp. 90-98.
-
(1997)
Proceedings of the 13th Annual Computer Security Applications Conference
, pp. 90-98
-
-
Cheung, S.1
-
28
-
-
0001989185
-
A new family of authentication protocols
-
October ACM Press
-
R.J. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas and R.M. Needham, "A New Family of Authentication Protocols," ACM Operating Systems Review, vol. 32, n. 4, pp. 9-20, October 1998, ACM Press.
-
(1998)
ACM Operating Systems Review
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.J.1
Bergadano, F.2
Crispo, B.3
Lee, J.H.4
Manifavas, C.5
Needham, R.M.6
-
29
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Feb.
-
A. Perrig, R. Canetti, D. Song, D. Tygar, "Efficient and Secure Source Authentication for Multicast," in Network and Distributed System Security Symposium, NDSS '01, Feb. 2001.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
30
-
-
6344258648
-
2HARP: A secure routing protocol for mobile ad hoc networks
-
San Francisco, USA, May
-
P-W Yau, C. J. Mitchell, "2HARP: A Secure Routing Protocol for Mobile Ad Hoc Networks," 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 2004.
-
(2004)
5th World Wireless Congress (WWC 2004)
-
-
Yau, P.-W.1
Mitchell, C.J.2
-
31
-
-
84905003107
-
A method for security enhancements in AODV protocol
-
Xian, China
-
X. Du, Y. Wang, J. Ge, Y. Wang, "A Method for Security Enhancements in AODV Protocol," 17 th International Conference on Advanced Information Networking and Applications (AINA), Xian, China, 2003.
-
(2003)
17 Th International Conference on Advanced Information Networking and Applications (AINA)
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
33
-
-
0010647669
-
The many faces of publish/subscribe
-
URL citeseer.ist.psu.edu/649723.html
-
P.T. Eugster, P.A. Felber, R. Guerraoui, A-M. Kermarrec, "The Many Faces of Publish/Subscribe," Technical Report, URL citeseer.ist.psu.edu/ 649723.html.
-
Technical Report
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
34
-
-
84929315070
-
Security issues and requirements for internet-scale publish-subscribe systems
-
January
-
C. Wang, A. Carzaniga, D. Evans, A. L. Wolf, "Security Issues and Requirements for Internet-Scale Publish-Subscribe Systems," Hawaii International Conference on System Sciences, January, 2002.
-
(2002)
Hawaii International Conference on System Sciences
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
|