-
1
-
-
4444225744
-
On the Performance of Group Key Agreement Protocols
-
Aug
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik, "On the Performance of Group Key Agreement Protocols", ACM Transactions on Information and System Security, vol. 7, no. 3, Aug. 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Tsudik, G.4
-
2
-
-
0003466087
-
Scalable Multicast Key Distribution
-
May
-
A. Ballardie, "Scalable Multicast Key Distribution", RFC 1949, May 1996.
-
(1949)
RFC
-
-
Ballardie, A.1
-
4
-
-
85028765277
-
Perfectly-Secure Key Distribution for Dynamic Conferences
-
92, Aug
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-Secure Key Distribution for Dynamic Conferences", Proceedings of Advances in Cryptology - Crypto '92, Aug. 1992.
-
(1992)
Proceedings of Advances in Cryptology - Crypto
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
6
-
-
0032661699
-
Multicast Security: A Taxonomy and Some Efficient Constructions
-
INFOCOM, Mar
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions", Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies - INFOCOM 1999, Mar. 1999.
-
(1999)
Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
8
-
-
0032627571
-
Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques
-
99, Mar
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key Management for Secure Internet Multicast using Boolean Function Minimization Techniques", Proceedings of IEEE Infocom'99, Mar. 1999.
-
(1999)
Proceedings of IEEE Infocom
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
9
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug
-
G.-H. Chiou and W.-T. Chen, "Secure broadcasting using the secure lock", IEEE Transactions on Software Engineering, vol. 15, no. 8, pp. 929-934, Aug. 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.-H.1
Chen, W.-T.2
-
10
-
-
3543105535
-
Combinatorial Optimization of Group Key Management
-
Mar
-
M. Eltoweissy, M. H. Heydari, L. Morales, and I. H. Sudborough, "Combinatorial Optimization of Group Key Management", Journal of Network and Systems Management, vol. 12, no. 1, Mar. 2004.
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.1
-
-
Eltoweissy, M.1
Heydari, M.H.2
Morales, L.3
Sudborough, I.H.4
-
14
-
-
3142512728
-
Tree-Based Group Key Agreement
-
Feb
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-Based Group Key Agreement", ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 60-96, Feb. 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
15
-
-
0000961370
-
Iolus: A Framework for Scalable Secure Multicasting
-
97, Sept
-
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting". Proceedings of the ACM SIGCOMM '97, Sept. 1997.
-
(1997)
Proceedings of the ACM SIGCOMM
-
-
Mittra, S.1
-
16
-
-
0034838199
-
ELK, a New Protocol for Efficient Large-Group Key Distribution
-
S&P, May
-
A. Perrig, D. Song, and J. D. Tygar, "ELK, a New Protocol for Efficient Large-Group Key Distribution", Proceedings of IEEE Symposium on Security and Privacy (S&P), May 2001.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
17
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
Sept
-
S. Rafaeri and D. Hutchison, "A Survey of Key Management for Secure Group Communication", ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, Sept. 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeri, S.1
Hutchison, D.2
-
18
-
-
0038657277
-
Using AVL Trees for Fault Tolerant Group Key Management
-
Feb
-
O. Rodeh, K. P. Birman, and D. Dolev, "Using AVL Trees for Fault Tolerant Group Key Management", International Journal of Information Security, vol. 1, no. 2, Feb. 2002.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
-
-
Rodeh, O.1
Birman, K.P.2
Dolev, D.3
-
19
-
-
0038043478
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
-
May
-
A. T. Sherman and D. A. McGrew, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees", IEEE Transactions on Software Engineering, vol. 29, no. 5, May 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
-
-
Sherman, A.T.1
McGrew, D.A.2
-
21
-
-
0034247455
-
Key Agreement in Dynamic Peer Groups
-
Aug
-
M. Steiner, G. Tsudik, and M. Waidner, "Key Agreement in Dynamic Peer Groups", IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, Aug. 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
23
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs", IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|