-
2
-
-
38349029351
-
-
The Multicast Group Security Architecture. RFC3740
-
Hardjono, T.: Verisign. The Multicast Group Security Architecture. RFC3740. 2004
-
(2004)
Verisign
-
-
Hardjono, T.1
-
4
-
-
38349027340
-
Toward Solving Multicast Key Management Problem
-
Du, F., Ni, L.M., Esfahanian, A.-H.: Toward Solving Multicast Key Management Problem. Computer Communications and Networks, 232-236 (1999)
-
(1999)
Computer Communications and Networks
, pp. 232-236
-
-
Du, F.1
Ni, L.M.2
Esfahanian, A.-H.3
-
5
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35(3), 309-329 (2003)
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
6
-
-
84944395428
-
A Hybrid Key Tree scheme for Multicast to Balance Security and Efficiency Requirements
-
Duma, C., Shahmehri, N., Lambrix, P.: A Hybrid Key Tree scheme for Multicast to Balance Security and Efficiency Requirements. In: Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 378-383 (2003)
-
(2003)
Proceedings of the Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 378-383
-
-
Duma, C.1
Shahmehri, N.2
Lambrix, P.3
-
7
-
-
38349066432
-
Reducing Latency in Multicast Group Re-keying using Eulers Theorem
-
April, 2003
-
Pegueroles, J., Rico-Novella, F.: Reducing Latency in Multicast Group Re-keying using Eulers Theorem. IEEE Communication letters, April 2003, 6(4), 128-133 (2003)
-
(2003)
IEEE Communication letters
, vol.6
, Issue.4
, pp. 128-133
-
-
Pegueroles, J.1
Rico-Novella, F.2
-
8
-
-
0000205020
-
Efficient Communication-Storage Tradeoffs For multicast Encryption
-
Canneti, R.: Efficient Communication-Storage Tradeoffs For multicast Encryption. In: Advances in Cryptology-EUROCRYPT 1999, pp. 456-477 (1999)
-
(1999)
Advances in Cryptology-EUROCRYPT
, pp. 456-477
-
-
Canneti, R.1
-
9
-
-
0036505660
-
Design of Secure Multicast Key Management Schemes With Communication Budget Constraint
-
March
-
Li, M., Poovendran, R., Berenstein, C.: Design of Secure Multicast Key Management Schemes With Communication Budget Constraint. IEEE Communications Letters 6(3) (March 2002)
-
(2002)
IEEE Communications Letters
, vol.6
, Issue.3
-
-
Li, M.1
Poovendran, R.2
Berenstein, C.3
-
11
-
-
0032284813
-
Design of chaotic feed forward stream cipher
-
Hong, Z., Jun, Y., Xie-Ting, L.: Design of chaotic feed forward stream cipher. Acta Electronica Sinica 26(1), 122-126 (1998)
-
(1998)
Acta Electronica Sinica
, vol.26
, Issue.1
, pp. 122-126
-
-
Hong, Z.1
Jun, Y.2
Xie-Ting, L.3
-
12
-
-
38349065588
-
-
Alvarez, G.: Security problems with a chaos-based deniable authentication scheme. arXiv:nlin. CD/0412023, 9 (December 2004)
-
Alvarez, G.: Security problems with a chaos-based deniable authentication scheme. arXiv:nlin. CD/0412023, 9 (December 2004)
-
-
-
-
13
-
-
38349072152
-
-
arXiv:cs.CR/0411030, November
-
Bergamo, P., D'Arco, P., Santis, A., Kocarev, L.: Security of Public Key Cryptosystems based on Chebyshev Polynomials. arXiv:cs.CR/0411030, vol. 10 (November 2004)
-
(2004)
Security of Public Key Cryptosystems based on Chebyshev Polynomials
, vol.10
-
-
Bergamo, P.1
D'Arco, P.2
Santis, A.3
Kocarev, L.4
-
14
-
-
0029720059
-
Diffie-Hellman Key Distribution Extended To Group Communication
-
New Delhi, India, pp, ACM Press, New York
-
Steiner, M., Tsudik, G., Waidner, M.: Diffie-Hellman Key Distribution Extended To Group Communication. In: Proceedings of the 3rd ACM conference on Computer and communications security, New Delhi, India, pp. 31-37. ACM Press, New York (1996)
-
(1996)
Proceedings of the 3rd ACM conference on Computer and communications security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
15
-
-
4444225744
-
On The Performance of Group Key Agreement Protocols
-
Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On The Performance of Group Key Agreement Protocols. ACM Transactions on Information and System Security 7(3), 457-488 (2004)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Tsudik, G.4
-
16
-
-
3142632089
-
Mattblaze: Just Fast Keying: Key Agreement in a Hostile Internet
-
Aiello, W., Bellovin, S.M., Mattblaze: Just Fast Keying: Key Agreement in a Hostile Internet. ACM Transactions on Information and System Security 7(2), 242-273 (2004)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 242-273
-
-
Aiello, W.1
Bellovin, S.M.2
-
17
-
-
1342275514
-
A survey of chaotic secure communication systems
-
Yang, T.: A survey of chaotic secure communication systems. International Journal of Computational Cognition 2(2), 81-130 (2004)
-
(2004)
International Journal of Computational Cognition
, vol.2
, Issue.2
, pp. 81-130
-
-
Yang, T.1
-
18
-
-
0038043478
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees, 29(5), 444-458
-
Los Alamitos
-
McGrew, D.A., Sherman, A.T.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees, 29(5), 444-458. IEEE Computer Society, Los Alamitos (2003)
-
(2003)
IEEE Computer Society
-
-
McGrew, D.A.1
Sherman, A.T.2
-
20
-
-
0034449805
-
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
-
November
-
Kim, Y., Perrig, A., Tsudik, G.: Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups. In: Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), pp. 235-244 (November 2000)
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
24
-
-
67649120250
-
Solvable 2-dimensional Rational Chaotic Map Defined by Jacobian Elliptic Functions
-
Kato, A., Kohda, T.: Solvable 2-dimensional Rational Chaotic Map Defined by Jacobian Elliptic Functions. Circuits and Systems, 1477-1480 (2005)
-
(2005)
Circuits and Systems
, vol.1477-1480
-
-
Kato, A.1
Kohda, T.2
-
25
-
-
0346311382
-
Jacobian elliptic Chebyshev rational maps
-
Kohda, T., Fujisaki, H.: Jacobian elliptic Chebyshev rational maps. Physica D 148, 242-254 (2001)
-
(2001)
Physica D
, vol.148
, pp. 242-254
-
-
Kohda, T.1
Fujisaki, H.2
-
26
-
-
0031258419
-
Discrete-Time Chaotic Encryption Systems Part I: Statistical Design Approach
-
Gotz, M., Kelber, K., Schwarz, W.: Discrete-Time Chaotic Encryption Systems Part I: Statistical Design Approach. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 44(10), 963-970 (1997)
-
(1997)
IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications
, vol.44
, Issue.10
, pp. 963-970
-
-
Gotz, M.1
Kelber, K.2
Schwarz, W.3
-
27
-
-
19744369256
-
DDH-based group key agreement in a mobile environment
-
Nam, J., Lee, J., Kim, S., Won, D.: DDH-based group key agreement in a mobile environment. The Journal of Systems and Software, 73-83 (2005)
-
(2005)
The Journal of Systems and Software
, vol.73-83
-
-
Nam, J.1
Lee, J.2
Kim, S.3
Won, D.4
|