메뉴 건너뛰기




Volumn 2848, Issue , 2003, Pages 181-195

Constructing disjoint paths for secure communication

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; BANDWIDTH; DISTRIBUTED COMPUTER SYSTEMS; SECURE COMMUNICATION;

EID: 34548353311     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-39989-6_13     Document Type: Article
Times cited : (12)

References (32)
  • 7
    • 84884730529 scopus 로고
    • An optimal class of symmetric key generation systems
    • R. Blom. An optimal class of symmetric key generation systems. In Proc. of EUROCRYPT '84, pages 335-338, 1984.
    • (1984) Proc. of EUROCRYPT '84 , pp. 335-338
    • Blom, R.1
  • 9
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from weil pairing
    • D. Boneh and M. Franklin. Identity-based encryption from weil pairing. In Proc. of CRYPTO 2001, pages 213-229, 2001.
    • (2001) Proc. of CRYPTO 2001 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 13
    • 84945708671 scopus 로고
    • Algorithm 360: Shortest path forest with topological ordering
    • R. Dial. Algorithm 360: Shortest path forest with topological ordering. Comm. ACM, pages 632-633, 1969.
    • (1969) Comm. ACM , pp. 632-633
    • Dial, R.1
  • 14
    • 0027341860 scopus 로고
    • Perfectly secure message transmission
    • D. Dolev, C. Dwork, O. Waarts, and M. Yung. Perfectly secure message transmission. JACM, 40(1):17-47, 1993.
    • (1993) JACM , vol.40 , Issue.1 , pp. 17-47
    • Dolev, D.1    Dwork, C.2    Waarts, O.3    Yung, M.4
  • 15
    • 0015330635 scopus 로고
    • Theoretical improvements in algorithmic efficiency for network low problems
    • J. Edmonds and R.M. Karp. Theoretical improvements in algorithmic efficiency for network low problems. J. ACM, 19:248-264, 1972.
    • (1972) J. ACM , vol.19 , pp. 248-264
    • Edmonds, J.1    Karp, R.M.2
  • 16
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Proc. of CRYPTO'86, pages 186-194, 1986.
    • (1986) Proc. of CRYPTO'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 17
    • 84957653101 scopus 로고    scopus 로고
    • Secure communication in minimal connectivity models
    • M. Franklin and R. Wright. Secure communication in minimal connectivity models. In Proc. of EUROCRYPT'98, pages 346-360, 1998.
    • (1998) Proc. of EUROCRYPT'98 , pp. 346-360
    • Franklin, M.1    Wright, R.2
  • 19
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • L. Gong. Increasing availability and security of an authentication service. IEEE J. Selected Areas in Communications, 11(5):657-662, 1993.
    • (1993) IEEE J. Selected Areas in Communications , vol.11 , Issue.5 , pp. 657-662
    • Gong, L.1
  • 21
    • 0003601787 scopus 로고
    • Technical Report Interim Technical Report 8, Operation Research Center, MIT, Cambridge, MA
    • W.S. Jewell. Optimal flow through networks. Technical Report Interim Technical Report 8, Operation Research Center, MIT, Cambridge, MA, 1958.
    • (1958) Optimal Flow Through Networks
    • Jewell, W.S.1
  • 22
    • 0003421296 scopus 로고    scopus 로고
    • PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
    • J. Kleinberg. Approximation Algorithms for Disjoint Paths Problems. PhD thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1996.
    • (1996) Approximation Algorithms for Disjoint Paths Problems
    • Kleinberg, J.1
  • 26
    • 0005986692 scopus 로고
    • Secret-key agreement without public-key cryptography
    • T. Leighton and S. Micali. Secret-key agreement without public-key cryptography (extended abstract). In Proc. of CRYPTO '93, pages 456-479, 1993.
    • (1993) Proc. of CRYPTO '93 , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 27
    • 0019608784 scopus 로고
    • On sharing secrets and Reed-Solomon codes
    • R. McEliece and D. Sarwate. On sharing secrets and Reed-Solomon codes. Comm. ACM, 24(9):583-584, 1981.
    • (1981) Comm. ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.1    Sarwate, D.2
  • 30
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. ACM, 22(11): 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 31
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proc. of CRYPTO '84, pages 47-53, 1984.
    • (1984) Proc. of CRYPTO '84 , pp. 47-53
    • Shamir, A.1
  • 32
    • 0015202957 scopus 로고
    • On some techniques useful for solution of transportation network problems
    • N. Tomizava. On some techniques useful for solution of transportation network problems. Networka, 1:173-194, 1972.
    • (1972) Networka , vol.1 , pp. 173-194
    • Tomizava, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.