-
1
-
-
27644534176
-
Secure spread: An integrated architecture for secure group communication
-
Y. Amir, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G. Tsudik, "Secure Spread: An Integrated Architecture for Secure Group Communication," IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, 2005, pp. 248-261.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 248-261
-
-
Amir, Y.1
Nita-Rotaru, C.2
Schultz, J.L.3
Stanton, J.4
Tsudik, G.5
-
2
-
-
4444225744
-
On the performance of group key agreement protocols
-
Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik, "On the performance of group key agreement protocols," ACM Transactions on Information and System Security, Vol. 7, No. 3, 2004. pp. 457-488.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Tsudik, G.4
-
3
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
Y. Amir, et al., "Secure group communication using robust contributory key agreement" IEEE Trans. on Parallel and Distributed Systems, Vol. 15, No. 5, 2004, pp.468-480.
-
(2004)
IEEE Trans. on Parallel and Distributed Systems
, vol.15
, Issue.5
, pp. 468-480
-
-
Amir, Y.1
-
4
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based Group Key Agreement," ACM Transactions on Information and System Security, Vol 7, No. 1, 2004, pp. 60-96.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
6
-
-
84942438500
-
Batch rekeying for secure group communications
-
X.S. Li, Y.R. Yang, M.G. Gouda, S.S. Lam, "Batch Rekeying for Secure Group Communications," 10th International World Wide Web Conference on World Wide Web, 2001.
-
(2001)
10th International World Wide Web Conference on World Wide Web
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
7
-
-
0345427593
-
Using AVL trees for fault tolerant group key management
-
Cornell University
-
O. Rodeh, K. Birman, and D. Dolev, "Using AVL Trees for Fault Tolerant Group Key Management," Cornell University, Computer Science, Technical Report 2000-45, 2000.
-
(2000)
Computer Science, Technical Report
, vol.2000
, Issue.45
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
9
-
-
40849093930
-
Performance analysis of location-based group membership and data consistency algorithms in mobile ad hoc networks
-
J.W. Wilson and I.R. Chen, "Performance analysis of location-based group membership and data consistency algorithms in mobile ad hoc networks," International Journal of Wireless and Mobile Computing, 2005.
-
(2005)
International Journal of Wireless and Mobile Computing
-
-
Wilson, J.W.1
Chen, I.R.2
-
10
-
-
1642403770
-
Comparison of inter-area rekeying algorithms for secure wireless group communications
-
C. Zhang, B. DeCleene, J. Kurose, D. Towsley, "Comparison of Inter-Area Rekeying Algorithms for Secure Wireless Group Communications," Performance Evaluation. Vol. 49, No. 1-4, 2002, pp. 1-20.
-
(2002)
Performance Evaluation
, vol.49
, Issue.1-4
, pp. 1-20
-
-
Zhang, C.1
DeCleene, B.2
Kurose, J.3
Towsley, D.4
|