-
1
-
-
13944258256
-
-
Advances in Cryptology-Asiacrypt '99, Lecture Notes in Computer Science
-
J. Anzai, N. Matsuzaki, and T. Matsumoto, A Quick Group Key Distribution Scheme with Entity Revocation, Advances in Cryptology-Asiacrypt '99, Lecture Notes in Computer Science, Vol. 1716, pp. 333-347.
-
A quick group key distribution scheme with entity revocation
, vol.1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
2
-
-
85030481487
-
How to broadcast a secret
-
S. Berkovits, How to Broadcast a Secret, Advances in Cryptology-Eurocrypt '91, Lecture Notes in Computer Science, vol. 547, pp. 536-541, 1991.
-
(1991)
Advances in Cryptology-Eurocrypt '91, Lecture Notes in Computer Science
, vol.547
, pp. 536-541
-
-
Berkovits, S.1
-
3
-
-
0001720832
-
Generalised beimel-chor schemes for broadcast encryption and interactive key distribution
-
C. Blundo, Luiz A. Frota Mattos, and D. R. Stinson, Generalised Beimel-Chor Schemes for Broadcast Encryption and Interactive Key Distribution, Theoretical Computer Science, vol. 200, pp. 313-334, 1998.
-
(1998)
Theoretical Computer Science
, vol.200
, pp. 313-334
-
-
Blundo, C.1
Mattos Frota, L.A.2
Stinson, D.R.3
-
4
-
-
0032661699
-
Issue in multicast security: A taxonomy and efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, Issue in Multicast Security: A Taxonomy and Efficient Constructions, Infocom '99, pp. 708-716, 1999.
-
(1999)
Infocom '99
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
5
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
R. Canetti, T. Malkin, and K. Nissim, Efficient Communication-Storage Tradeoffs for Multicast Encryption, Advances in Cryptology-Eurocrypt '99, Lecture Notes in Computer Science, vol. 1592, pp. 459-474, 1999.
-
(1999)
Advances in Cryptology-Eurocrypt '99, Lecture Notes in Computer Science
, vol.1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
6
-
-
0034188648
-
-
May
-
B. Chor, A. Fiat, M. Naor and B. Pinkas, Traitor Tracing, IEEE Transactions on Information Theory, vol. 46, No. 3, pp. 893-910, May 2000.
-
(2000)
Traitor Tracing, IEEE Transactions on Information Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
8
-
-
20444447508
-
Fault tolerant and distributed broadcast encryption, rsa conference 2003 (ctrsa 2003)
-
Springer Verlag
-
P. D'Arco and D. R. Stinson, Fault Tolerant and Distributed Broadcast Encryption, RSA Conference 2003 (CTRSA 2003), Lecture Notes in Computer Science, Vol. 2612, pp. 262-279, Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2612
, pp. 262-279
-
-
D'Arco, P.1
Stinson, D.R.2
-
9
-
-
0029720071
-
Digital signets: Self-enforcing protection of digital information
-
C. Dwork, J. Lotspiech, and M. Naor, Digital Signets: Self-Enforcing Protection of Digital Information, Proceedings of the -th Symposium on the Theory of Computation, pp. 489-498, 1996.
-
(1996)
Proceedings of the -th Symposium on the Theory of Computation
, pp. 489-498
-
-
Dwork, C.1
Lotspiech, J.2
Naor, M.3
-
10
-
-
84979291225
-
-
A. Fiat and M. Naor, Broadcast Encryption, Proceedings of Crypto '93, Lecture Notes in Computer Science, vol. 773, pp. 480-491, 1994.
-
(1994)
Broadcast Encryption, Proceedings of Crypto '93, Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
0013138808
-
Dynamic traitor tracing
-
A. Fiat and T. Tessa, Dynamic Traitor Tracing, Journal of Cryptology, Vol. 14, pp. 211-223, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, pp. 211-223
-
-
Fiat, A.1
Tessa, T.2
-
12
-
-
84974588069
-
Long-lived broadcast encryption, advances in cryptology-crypto 2000
-
J. Garay, J. Staddon, and A. Wool, Long-Lived Broadcast Encryption, Advances in Cryptology-Crypto 2000, Lecture Notes in Computer Science, vol. 1880, pp. 333-352, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1880
, pp. 333-352
-
-
Garay, J.1
Staddon, J.2
Wool, A.3
-
13
-
-
84937435227
-
The LSD broadcast encryption scheme, advances in cryptology-crypto '02
-
D. Halevy and A. Shamir, The LSD Broadcast Encryption Scheme, Advances in Cryptology-Crypto '02, Lecture Notes in Computer Science, vol. 2442, pp. 47-60, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
14
-
-
84957057937
-
-
R. Kumar, S. Rajagopalan, and A. Sahai, Coding Constructions for Blacklisting Problems without Computational Assumptions, Advances in Cryptology-Crypto '99, Lecture Notes in Computer Science, Vol. 1666, pp. 609-623, 1999.
-
(1999)
Coding Constructions for Blacklisting Problems Without Computational Assumptions, Advances in Cryptology-Crypto '99, Lecture Notes in Computer Science
, vol.1666
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
15
-
-
84930043991
-
-
H. Kurnio, R. Safani-Naini, and H. Wang, A Secure Rekeying Scheme with Key Recovery Property, ACISP 2002, Lecture Notes in Computer Science, Vol. 2384, pp. 40-55, 2002.
-
(2002)
A Secure Rekeying Scheme with Key Recovery Property, ACISP 2002, Lecture Notes in Computer Science
, vol.2384
, pp. 40-55
-
-
Kurnio, H.1
Safani-Naini, R.2
Wang, H.3
-
16
-
-
84880852861
-
-
D. Naor, M. Naor, and J. Lotspiech, Revocation and Tracing Schemes for Stateless Receivers Advances in Cryptology-Crypto '01, Lecture Notes in Computer Science, vol. 2139, pp. 41-62, 2001.
-
(2001)
Revocation and Tracing Schemes for Stateless Receivers Advances in Cryptology-Crypto '01, Lecture Notes in Computer Science
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
17
-
-
84944319284
-
-
M. Naor and B. Pinkas, Efficient Trace and Revoke Schemes, Financial Cryptography 2000, Lecture Notes in Computer Science, vol. 1962, pp. 1-21, 2000.
-
(2000)
Efficient Trace and Revoke Schemes, Financial Cryptography 2000, Lecture Notes in Computer Science
, vol.1962
, pp. 1-21
-
-
Naor, M.1
Pinkas, B.2
-
19
-
-
79952238646
-
Self-healing key distribution with revocation
-
May 12-15 Berkeley, California
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin and D. Dean, Self-Healing Key Distribution with Revocation, IEEE Symposium on Security and Privacy, May 12-15, 2002, Berkeley, California.
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
20
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
J. N. Staddon, D. R. Stinson and R. Wei, Combinatorial properties of frameproof and traceability codes, IEEE Transactions on Information Theory vol. 47, pp. 1042-1049, 2001.
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
21
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
D. R. Stinson, On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption, Designs, Codes and Cryptography, vol. 12, pp. 215-243, 1997.
-
(1997)
Designs, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
22
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
D. R. Stinson and R. Wei, Combinatorial properties and constructions of traceability schemes and frameproof codes, SIAM Journal on Discrete Mathematics, vol. 11, pp. 41-53, 1998.
-
(1998)
SIAM Journal on Discrete Mathematics
, vol.11
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
|