-
1
-
-
4444225744
-
On the performance of group key agreement protocols
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik. On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur., 7(3):457-488, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Tsudik, G.4
-
2
-
-
33644606296
-
Group key agreement in ad hoc networks
-
INRIA Rocquencourt, May
-
R. Bhaskar. Group key agreement in ad hoc networks. Technical Report RR-4832, INRIA Rocquencourt, May 2003. http://www.inria.fr/rrrt/rr-4832.html.
-
(2003)
Technical Report
, vol.RR-4832
-
-
Bhaskar, R.1
-
3
-
-
84948991087
-
A secure and efficient conference key distribution system
-
Springer-Verlag Berlin, May
-
M. Burmester and Y. Desmedt. A secure and efficient conference key distribution system. In Advances in Cryptology (EUROCRYPT '94),Lecture Notes in Computer Science, volume 950, pages 275-286. Springer-Verlag Berlin, May 1994.
-
(1994)
Advances in Cryptology (EUROCRYPT '94),Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
4
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
S. Capkun, L. Buttyn, and J.-P. Hubaux. Self-organized public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1):52-64, 2003.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyn, L.2
Hubaux, J.-P.3
-
5
-
-
0038087188
-
Separating decision diffie-hellman from diffie-hellman in cryptographic groups
-
A. Joux and K. Nguyen. Separating decision diffie-hellman from diffie-hellman in cryptographic groups. Cryptology ePrint Archive, Report 2001/003, 2001. http:// eprint.iacr.org/.
-
(2001)
Cryptology ePrint Archive, Report
, vol.2001
, Issue.3
-
-
Joux, A.1
Nguyen, K.2
-
6
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Advances in Cryptology - CRYPTO 2003. Springer
-
J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. In Advances in Cryptology - CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 110-125. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
7
-
-
84904254536
-
Communication-efficient group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik. Communication-efficient group key agreement. In Information Systems Security, Proc. of the 17th International Information Security Conference, IFIP SEC'01, 2001.
-
Information Systems Security, Proc. of the 17th International Information Security Conference, IFIP SEC'01, 2001
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
8
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik. Tree-based group key agreement. ACM Transactions on Information and System Security, 7(1):60-96, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
9
-
-
0042473975
-
Route driven gossip: Probabilistic reliable multicast in ad hoc networks
-
J. Luo, P. T. Eugster, and J.-P. Hubaux. Route driven gossip: Probabilistic reliable multicast in ad hoc networks. In INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Luo, J.1
Eugster, P.T.2
Hubaux, J.-P.3
-
12
-
-
23944524767
-
-
September
-
Standards for Efficient Cryptography Group (SEC). Sec 1: Elliptic curve cryptography, http://www.sec.org, September 2000.
-
(2000)
Sec 1: Elliptic Curve Cryptography
-
-
|