-
1
-
-
0034238689
-
Key management for restricted multicast using broadcast encryption
-
ABDALLA, M., SHAVITT, Y., AND WOOL, A. 2000. Key management for restricted multicast using broadcast encryption. IEEE/ACM Transactions on Networking 8, 4, 443-454.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.4
, pp. 443-454
-
-
Abdalla, M.1
Shavitt, Y.2
Wool, A.3
-
3
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Paris, France. Springer-Verlag, New York
-
ANDEHSON, R. AND KÜHN, M. 1997. Low cost attacks on tamper resistant devices. In 5th Security Protocols Workshop, LNCS 1361. Paris, France. Springer-Verlag, New York. 125-136.
-
(1997)
5th Security Protocols Workshop, LNCS
, vol.1361
, pp. 125-136
-
-
Andehson, R.1
Kühn, M.2
-
4
-
-
84860037128
-
Toasting the crackers
-
26 Jan., reporter Mark Ward, Front Page
-
BBC. 26 Jan. 2001. Toasting the crackers. BBC news on Science and Technology, reporter Mark Ward, Front Page, http://news.bc.co.uk/hi/sciance/ nature/1138550.stm.
-
(2001)
BBC News on Science and Technology
-
-
-
5
-
-
85030481487
-
How to broadcast a secret
-
Springer-Verlag, New York
-
BEBKOVITS, S. 1991. How to broadcast a secret. In Advances in Cryptology - EUROCRYPT '91, LNCS 547. Springer-Verlag, New York. 535-541.
-
(1991)
Advances in Cryptology - EUROCRYPT '91, LNCS
, vol.547
, pp. 535-541
-
-
Bebkovits, S.1
-
6
-
-
84948984838
-
Space requirements for broadcast encryption
-
A. D. Santis, Ed. Springer-Verlag, New York
-
BLUNDO, C. AND CRESTI, A. 1994. Space requirements for broadcast encryption. In Advances in Cryptology - EUROCRYPT '94, LNCS 950, A. D. Santis, Ed. Springer-Verlag, New York. 287-298.
-
(1994)
Advances in Cryptology - EUROCRYPT '94, LNCS
, vol.950
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
7
-
-
84955614214
-
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
-
Springer-Verlag, New York
-
BLUNDO, C., FROTA MATTOS, L. A., AND STINSON, D. R. 1996. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. In Advances in Cryptology - CRYPTO '96, LNCS 1109. Springer-Verlag, New York. 387-400.
-
(1996)
Advances in Cryptology - CRYPTO '96, LNCS
, vol.1109
, pp. 387-400
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
8
-
-
84957656774
-
MARKS: Zero side-effect multicast key management using arbitrarily revealed key sequences
-
L. Rizzo and S. Fdida, Eds. Pisa, Italy. Springer-Verlag, New York
-
BRISCOE, B. 1999. MARKS: Zero side-effect multicast key management using arbitrarily revealed key sequences. In Proc 1st International Workshop on Networked Group Communication (NGC '99), LNCS 1736, L. Rizzo and S. Fdida, Eds. Pisa, Italy. Springer-Verlag, New York.
-
(1999)
Proc 1st International Workshop on Networked Group Communication (NGC '99), LNCS
, vol.1736
-
-
Briscoe, B.1
-
9
-
-
0032661699
-
Multicast security: A taxonomy and efficient constructions
-
CANETTI, R., GARAY, J., ITKIS, G., MICCIANCIO, D., NAOR, M., AND PINKAS, B. 1999a. Multicast security: A taxonomy and efficient constructions. In Proc. IEEE INFOCOM '99. 708-716.
-
(1999)
Proc. IEEE INFOCOM '99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
10
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
Springer-Verlag, New York
-
CANETTI, R., MALKIN, T., AND NISSIM, K. 1999b. Efficient communication-storage tradeoffs for multicast encryption. In Advances in Cryptology-EUROCRYPT '99, LNCS 1592. Springer-Verlag, New York. 459-474.
-
(1999)
Advances in Cryptology-EUROCRYPT '99, LNCS
, vol.1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
11
-
-
84979291225
-
Broadcast encryption
-
Springer-Verlag, New York
-
FIAT, A. AND NAOR, M. 1994. Broadcast encryption. In Advances in Cryptology - CRYPTO '93, LNCS 773. Springer-Verlag, New York. 480-491.
-
(1994)
Advances in Cryptology - CRYPTO '93, LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
12
-
-
84974588069
-
Long-lived broadcast encryption
-
M. Bellare, Ed. Springer-Verlag, New York
-
GARAY, J. A., STADDON, J., AND WOOL, A. 2000. Long-lived broadcast encryption. In. Advances in Cryptology - CRYPTO '2000. LNCS 1880, M. Bellare, Ed. Springer-Verlag, New York. 333-352.
-
(2000)
Advances in Cryptology - CRYPTO '2000. LNCS
, vol.1880
, pp. 333-352
-
-
Garay, J.A.1
Staddon, J.2
Wool, A.3
-
14
-
-
84937435227
-
The LSD broadcast encryption scheme
-
M. Yung, Ed. Springer-Verlag, New York
-
HALEVY, D. AND SHAMIR, A. 2002. The LSD broadcast encryption scheme. In Advances in Cryptology-CRYPTO '02. LNCS 2442, M. Yung, Ed. Springer-Verlag, New York.
-
(2002)
Advances in Cryptology-CRYPTO '02. LNCS
, vol.2442
-
-
Halevy, D.1
Shamir, A.2
-
16
-
-
0037810691
-
A practical revocation scheme for broadcast encryption using smart cards
-
Oakland, CA
-
KOGAN, N., SHAVITT, Y., AND WOOL, A. 2003. A practical revocation scheme for broadcast encryption using smart cards. In Proc. IEEE Symp. on Security and Privacy. Oakland, CA. 225-235.
-
(2003)
Proc. IEEE Symp. on Security and Privacy
, pp. 225-235
-
-
Kogan, N.1
Shavitt, Y.2
Wool, A.3
-
17
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
Springer-Verlag, New York
-
KUMAR, R., RAJAGOPALAN, S., AND SAHAI, A. 1999. Coding constructions for blacklisting problems without computational assumptions. In Advances in Cryptology - CRYPTO '99, LNCS 1666. Springer-Verlag, New York. 609-623.
-
(1999)
Advances in Cryptology - CRYPTO '99, LNCS
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
18
-
-
84957696450
-
Combinatorial bounds for broadcast encryption
-
K. Nyberg, Ed. Espoo, Finland. Springer-Verlag, New York
-
LUBY, M. AND STADDON, J. 1998. Combinatorial bounds for broadcast encryption. In Advances in Cryptology-EUROCRYPT '98, LNCS 1403, K. Nyberg, Ed. Espoo, Finland. Springer-Verlag, New York. 512-526.
-
(1998)
Advances in Cryptology-EUROCRYPT '98, LNCS
, vol.1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
19
-
-
84944319284
-
Efficient trace and revoke schemes
-
Springer-Verlag, New York
-
NAOR, M. AND PINKAS, B. 2000. Efficient trace and revoke schemes. In Financial Cryptography '00, LNCS 1962. Springer-Verlag, New York. 1-20.
-
(2000)
Financial Cryptography '00, LNCS
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
20
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer-Verlag, New York
-
NAOR, D., NAOR, M., AND LOTSPIECH, J. B. 2001. Revocation and tracing schemes for stateless receivers. In Advances in Cryptology - CRYPTO '2001, LNCS 2139. Springer-Verlag, New York. 41-62.
-
(2001)
Advances in Cryptology - CRYPTO '2001, LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
21
-
-
84959062173
-
Efficient state updates for key management
-
Springer-Verlag, New York
-
PINKAS, B. 2001. Efficient state updates for key management. In Digital Rights Management Workshop '2001, LNCS 2320. Springer-Verlag, New York. 40-56.
-
(2001)
Digital Rights Management Workshop '2001, LNCS
, vol.2320
, pp. 40-56
-
-
Pinkas, B.1
-
22
-
-
0018545449
-
How to share a secret
-
SHAMIH, A. 1979. How to share a secret. Communications of the ACM 22, 11, 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamih, A.1
-
23
-
-
0003657439
-
Key management for multicast: Issues and architectures
-
WALLNER, D. M., HARDER, E. J., AND AGEE, R. C. 1998. Key management for multicast: Issues and architectures. Internet Draft. Available from http://www.ietf.org/ID.html.
-
(1998)
Internet Draft
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
24
-
-
0033893174
-
Secure group communications using key graphs
-
WONG, C. K., GOUDA, M., AND LAM, S. S. 2000. Secure group communications using key graphs. IEEE/ACM Transactions on Networking 8, 1 (Feb.), 16-30.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1 FEB
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|