-
1
-
-
0013107042
-
How to broadcast a secret
-
Shimshon Berkovits. How to broadcast a secret. In EUROCRYPT, 1991.
-
(1991)
EUROCRYPT
-
-
Berkovits, S.1
-
3
-
-
79954576480
-
An IPSec-based host architecture for secure internet multicast
-
Ran Canetti, Pau-Chen Cheng, Frederique Giraud, Dimitrios Pendarakis, Josyula R. Rao, and Pankaj Rohatgi. An IPSec-based host architecture for secure internet multicast. In Internet Society Symposium on Network and Distributed Systems Security, 2000.
-
(2000)
Internet Society Symposium on Network and Distributed Systems Security
-
-
Canetti, R.1
Cheng, P.2
Giraud, F.3
Pendarakis, D.4
Rao, J.R.5
Rohatgi, P.6
-
4
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, and Benny Pinkas. Multicast security: A taxonomy and some efficient constructions. In INFOCOMM'99, 1999.
-
(1999)
INFOCOMM'99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
38049013624
-
An efficient broadcast authentication scheme
-
ACM
-
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, and Chin-Ming Hsieh. An efficient broadcast authentication scheme. In ACM Symposium on Information, Computer and Communications Security. ACM, 2006.
-
(2006)
ACM Symposium on Information, Computer and Communications Security
-
-
Chang, S.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.4
-
7
-
-
34247325635
-
An efficient broadcast authentication scheme in wireless sensor networks
-
Shang-Ming Chang, Shiuhpyng Shieh, Warren W. Lin, and Chih-Ming Hsieh. An efficient broadcast authentication scheme in wireless sensor networks. In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, 2006.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
-
-
Chang, S.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.4
-
8
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
S. Cheung. An efficient message authentication scheme for link state routing. In ACSAC, 1997.
-
(1997)
ACSAC
-
-
Cheung, S.1
-
9
-
-
0017959977
-
Secure communications over insecure channels
-
Ralph C.Merkle. Secure communications over insecure channels. Communications of the ACM, 1978.
-
(1978)
Communications of the ACM
-
-
Merkle, R.C.1
-
15
-
-
0027874215
-
-
Ivan Getting. The Global Positioning System. IEEE Spectrum, December 1993.
-
Ivan Getting. The Global Positioning System. IEEE Spectrum, December 1993.
-
-
-
-
19
-
-
0019634370
-
Password authentication within insecure communication
-
Leslie Lamport. Password authentication within insecure communication. Communications of the ACM, 1981.
-
(1981)
Communications of the ACM
-
-
Lamport, L.1
-
20
-
-
4544378819
-
Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks
-
Technical report, Raleigh, NC, USA
-
Donggang Liu and Peng Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. Technical report, Raleigh, NC, USA, 2002.
-
(2002)
-
-
Liu, D.1
Ning, P.2
-
21
-
-
85000276942
-
Multilevel μ-tesla: Broadcast authentication for distributed sensor networks
-
Donggang Liu and Peng Ning. Multilevel μ-tesla: Broadcast authentication for distributed sensor networks. Trans. on Embedded Computing Sys., 3(4), 2004.
-
(2004)
Trans. on Embedded Computing Sys
, Issue.4
, pp. 3
-
-
Liu, D.1
Ning, P.2
-
22
-
-
33749513007
-
Practical broadcast authentication in sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
Donggang Liu, Peng Ning, Sencun Zhu, and Sushil Jajodia. Practical broadcast authentication in sensor networks. In MOBIQUITOUS '05: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pages 118-132, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
MOBIQUITOUS '05: Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
, pp. 118-132
-
-
Liu, D.1
Ning, P.2
Zhu, S.3
Jajodia, S.4
-
24
-
-
84965066515
-
Announcing the advanced encryption standard (aes)
-
National Institute of Stanards and Technology
-
National Institute of Stanards and Technology. Announcing the advanced encryption standard (aes). Federal Information, Processing Standards Publication 197, 2001.
-
(2001)
Federal Information, Processing Standards Publication
, vol.197
-
-
-
28
-
-
38049067426
-
-
A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report MIT/LCS/TM-82, 1977.
-
(1977)
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
29
-
-
38049036174
-
-
Ronald L. Rivest, Adi Shamir, and David A. Wagner. Time-lock puzzles and timed-release crypto. (MIT/LCS/TR-684):21, 1996.
-
Ronald L. Rivest, Adi Shamir, and David A. Wagner. Time-lock puzzles and timed-release crypto. (MIT/LCS/TR-684):21, 1996.
-
-
-
-
31
-
-
33751031293
-
Integrity (I) codes: Message Integrity Protection and Authentication Over Insecure Channels
-
Mario Čagalj, Srdjan Čapkun, RamKumar Rengaswamy, Ilias Tsigkogiannis, M. Srivastava, and Jean-Pierre Hubaux. Integrity (I) codes: Message Integrity Protection and Authentication Over Insecure Channels. In IEEE Symposium on Security and Privacy, 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Čagalj, M.1
Čapkun, S.2
Rengaswamy, R.3
Ilias Tsigkogiannis, M.S.4
Hubaux, J.5
|