-
1
-
-
26444596935
-
A method for masked sharing of group keys (3)
-
Anzai, J., Matsuzaki, N. and Matsumoto, T. (1999) ‘A method for masked sharing of group keys (3)’, IEICE Technical Report, ISEC99–38.
-
(1999)
IEICE Technical Report, ISEC99–38
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
4
-
-
0032661699
-
Multicast security: a taxonomy and some efficient constructions
-
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M. and Pinkas, B. (1999) ‘Multicast security: a taxonomy and some efficient constructions’, INFOCOMM.
-
(1999)
INFOCOMM
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
5
-
-
0029362456
-
On key storage in secure networks
-
Dyer, M., Fenner, T., Frieze, A. and Thomason, A. (1995) ‘On key storage in secure networks’, Journal of Cryptology, Vol. 8, pp.189–200.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
6
-
-
0010647669
-
The many faces of publish/subscribe
-
Eugster, P.T., Felber, P.A., Guerraoui, R. and Kermarrec, A-M. (2000) ‘The many faces of publish/subscribe’, Technical Report, Available at: citeseer.ist.psu.edu/649723.html.
-
(2000)
Technical Report
-
-
Eugster, P.T.1
Felber, P.A.2
Guerraoui, R.3
Kermarrec, A.-M.4
-
8
-
-
84979291225
-
Broadcast encryption
-
Springer-Verlag
-
Fiat, A. and Noar, M. (1994) ‘Broadcast encryption’, Lecture Notes in Computer Science, Advances in Cryptology, Springer-Verlag, Vol. 773, pp.480–491.
-
(1994)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Noar, M.2
-
9
-
-
31544456939
-
Security aspects in publish/subscribe systems
-
Edinburgh, Scotland.
-
Fiege, L., Zeidler, A., Buchmann, A., Kilian-Kehr, R. and Muhl, G. (2004) ‘Security aspects in publish/subscribe systems’, International Workshop on Distributed Event-Based Systems (DEBS ’04), Edinburgh, Scotland.
-
(2004)
International Workshop on Distributed Event-Based Systems (DEBS ’04)
-
-
Fiege, L.1
Zeidler, A.2
Buchmann, A.3
Kilian-Kehr, R.4
Muhl, G.5
-
10
-
-
0025212474
-
A matrix key distribution scheme
-
Gong, L. and Wheeler, D.J. (1990) ‘A matrix key distribution scheme’, Journal of Cryptology, Vol. 2, No. 2, pp.51–59.
-
(1990)
Journal of Cryptology
, vol.2
, Issue.2
, pp. 51-59
-
-
Gong, L.1
Wheeler, D.J.2
-
12
-
-
14844326195
-
The LSD broadcast encryption scheme
-
Santa Barbara, CA August
-
Halevy, D. and Shamir, A. (2002) ‘The LSD broadcast encryption scheme’, Advances in Cryptology: 22nd Annual International Cryptology Conference, Santa Barbara, CA, pp.18–22, August.
-
(2002)
Advances in Cryptology: 22nd Annual International Cryptology Conference
, pp. 18-22
-
-
Halevy, D.1
Shamir, A.2
-
13
-
-
0344875575
-
Information hiding, anonymity and privacy: a modular approach
-
Hughes, D. and Shmatilov, V. (2004) ‘Information hiding, anonymity and privacy: a modular approach’, Journal of Computer Security.
-
(2004)
Journal of Computer Security
-
-
Hughes, D.1
Shmatilov, V.2
-
14
-
-
33644536683
-
Scalable security and accounting services for content-based publish/subscribe systems
-
March
-
Khurana, H. (2005) ‘Scalable security and accounting services for content-based publish/subscribe systems’, ACM Symposium on Applied Computing (SAC), March.
-
(2005)
ACM Symposium on Applied Computing (SAC)
-
-
Khurana, H.1
-
15
-
-
3042592877
-
Ubiquitous access for collaborative information system using SVG
-
July, Zurich, Switzerland
-
Lee, S., Fox, G., Ko, S., Wang, M. and Qiu, X. (2002) ‘Ubiquitous access for collaborative information system using SVG, Proceedings of SVGopen Conference, July, Zurich, Switzerland.
-
(2002)
Proceedings of SVGopen Conference
-
-
Lee, S.1
Fox, G.2
Ko, S.3
Wang, M.4
Qiu, X.5
-
16
-
-
84949023663
-
Secret-key agreement without public-Key cryptography
-
Leighton, T. and Micali, S. (1994) ‘Secret-key agreement without public-Key cryptography’, Advances in Cryptology, pp.456–479.
-
(1994)
Advances in Cryptology
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
17
-
-
0017914899
-
Generation, distribution and installation of cryptographic keys
-
Matyas, S.M. and Meyer, C.H. (1978) ‘Generation, distribution and installation of cryptographic keys’, IBM Systems Journal, Vol. 2, pp.126–137.
-
(1978)
IBM Systems Journal
, vol.2
, pp. 126-137
-
-
Matyas, S.M.1
Meyer, C.H.2
-
19
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Chantilly, VA
-
Moody, Y.W. and Bacon, J. (2002) ‘A model of OASIS role-based access control and its support for active security’, ACM Symposium on Access Control Model and Technology, Chantilly, VA.
-
(2002)
ACM Symposium on Access Control Model and Technology
-
-
Moody, Y.W.1
Bacon, J.2
-
20
-
-
1642355346
-
Covert channels and anonymizing networks
-
Washington, DC
-
Moskowitz, I.S., Newman, R.E., Crepeau, D.P. and Miller, A.R. (2003) ‘Covert channels and anonymizing networks’, Proceedings of the ACM Workshop on Privacy in the Electronic Society, Washington, DC.
-
(2003)
Proceedings of the ACM Workshop on Privacy in the Electronic Society
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
21
-
-
84952964376
-
A message board system on WWW with visualizing function for on-door communication
-
Murayama, Y., Gondo, H., Nakamoto, Y., Segawa, N. and Miyazaki, M. (2001) ‘A message board system on WWW with visualizing function for on-door communication’, 34thHawaii International Conference on System Sciences.
-
(2001)
34thHawaii International Conference on System Sciences
-
-
Murayama, Y.1
Gondo, H.2
Nakamoto, Y.3
Segawa, N.4
Miyazaki, M.5
-
22
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
Needham, R. and Schroeder, M. (1978) ‘Using encryption for authentication in large networks of computers’, Communications of the ACM, Vol. 21, No. 12, December.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
23
-
-
15244342998
-
Revocation and tracing routines for stateless receivers
-
Springer-Verlag
-
Noar, D., Noar, M. and Lotspiech, J. (2001) ‘Revocation and tracing routines for stateless receivers’, Lecture Notes in Computer Science, Advances in Cryptology, Springer-Verlag, Vol. 2139.
-
(2001)
Lecture Notes in Computer Science, Advances in Cryptology
, vol.2139
-
-
Noar, D.1
Noar, M.2
Lotspiech, J.3
-
24
-
-
85084164565
-
Secure distribution of events in content-based publish subscribe systems
-
August, Washington, DC
-
Opyrchal, L. and Prakash, A. (2001) ‘Secure distribution of events in content-based publish subscribe systems’, USENIX Security 01, August, Washington, DC.
-
(2001)
USENIX Security 01
-
-
Opyrchal, L.1
Prakash, A.2
-
25
-
-
0842289248
-
Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks
-
San Fransisco, CA, December
-
Ramkumar, M., Memon, N. and Simha, R. (2003) ‘Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks’, Globecom, San Fransisco, CA, December.
-
(2003)
Globecom
-
-
Ramkumar, M.1
Memon, N.2
Simha, R.3
-
26
-
-
33646829629
-
On broadcast encryption with random key pre-distribution schemes
-
Kolkata, India, December
-
Ramkumar, M. (2005) ‘On broadcast encryption with random key pre-distribution schemes’, LNCS, ICISS 2005, Kolkata, India, December, Vol. 3803, pp.304–316.
-
(2005)
LNCS, ICISS 2005
, vol.3803
, pp. 304-316
-
-
Ramkumar, M.1
-
27
-
-
8344240024
-
Building a high-performance programmable secure coprocessor
-
February
-
Smith, S.W. and Weingart, S. (1998) ‘Building a high-performance programmable secure coprocessor’, IBM Technical Report RC21102, February.
-
(1998)
IBM Technical Report RC21102
-
-
Smith, S.W.1
Weingart, S.2
-
28
-
-
24344501341
-
Access control in collaborative systems
-
March
-
Tolone, W., Ahn, G-J. and Pai, T. (2005) ‘Access control in collaborative systems’, ACM Computing Surveys, Vol. 37, No. 1, March.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
-
29
-
-
84929315070
-
Security issues and requirements for internet-scale publish-subscribe systems
-
January
-
Wang, C., Carzaniga, A., Evans, D. and Wolf, A.L. (2002) ‘Security issues and requirements for internet-scale publish-subscribe systems’, Hawaii International Conference on System Sciences, January.
-
(2002)
Hawaii International Conference on System Sciences
-
-
Wang, C.1
Carzaniga, A.2
Evans, D.3
Wolf, A.L.4
-
30
-
-
84952968151
-
-
http://www.w3.org/TR/SVG/.
-
-
-
-
31
-
-
84952956631
-
-
For example, a ‘Google Message Board’ or a ‘Yahoo Message Board’
-
For example, a ‘Google Message Board’ or a ‘Yahoo Message Board’.
-
-
-
-
32
-
-
84952953506
-
-
Though catering for unregulated read-access is not a practical necessity, from a security stand-point, the assumption that ‘reading from the MB is open to all’ caters for posting of messages over insecure channels
-
Though catering for unregulated read-access is not a practical necessity, from a security stand-point, the assumption that ‘reading from the MB is open to all’ caters for posting of messages over insecure channels.
-
-
-
-
33
-
-
84952971732
-
-
If A posts a message for B no one else apart from A and B should even know that A attempted to communicate with B.
-
If A posts a message for B no one else apart from A and B should even know that A attempted to communicate with B.
-
-
-
-
34
-
-
84952960647
-
-
See
-
See https://www.trustedcomputinggroup.org/.
-
-
-
-
35
-
-
84952970552
-
-
Asymmetric RPS however does not employ any public key primitives
-
Asymmetric RPS however does not employ any public key primitives.
-
-
-
-
36
-
-
84952968763
-
-
As we shall see in a later section, a ‘higher authority’ instructs the LM-KDS to issue secrets corresponding to a ID A1 = h(A) to the node with ID A.
-
As we shall see in a later section, a ‘higher authority’ instructs the LM-KDS to issue secrets corresponding to a ID A1 = h(A) to the node with ID A.
-
-
-
-
37
-
-
84952973013
-
-
The limit is the number of bits used to represent the ID of any node - as each node requires a unique ID.
-
The limit is the number of bits used to represent the ID of any node - as each node requires a unique ID.
-
-
-
-
38
-
-
84952953189
-
-
This approach, of using host master keys to encrypt all other keys dates back to Matyas and Meyer (1978)
-
This approach, of using host master keys to encrypt all other keys dates back to Matyas and Meyer (1978).
-
-
-
-
39
-
-
84952969911
-
-
We shall denote by K (M) the encryption of a value M using a key K, in conjunction with some block cipher
-
We shall denote by K (M) the encryption of a value M using a key K, in conjunction with some block cipher.
-
-
-
-
40
-
-
84952966145
-
-
In some application scenarios even session secrets may need to be protected from the end user. This issue is briefly discussed in Section 6
-
In some application scenarios even session secrets may need to be protected from the end user. This issue is briefly discussed in Section 6.
-
-
-
-
41
-
-
84952953049
-
-
We shall henceforth use A to represent Alice’s public ID, and her TM. The context will make the distinction clear. We shall also represent by ‘Alice’ the person or her PDA
-
We shall henceforth use A to represent Alice’s public ID, and her TM. The context will make the distinction clear. We shall also represent by ‘Alice’ the person or her PDA.
-
-
-
-
42
-
-
84952954386
-
-
For instance, if Alice knows signatures for two nonce’s N1 and N2 she could easily fabricate the signature of Tu for N1N2. While there are simple techniques to overcome this problem, it is perhaps safer to ensure that both parties do not have freedom in choosing the nonce
-
For instance, if Alice knows signatures for two nonce’s N1 and N2 she could easily fabricate the signature of Tu for N1N2. While there are simple techniques to overcome this problem, it is perhaps safer to ensure that both parties do not have freedom in choosing the nonce.
-
-
-
-
43
-
-
84952961602
-
-
Alice will receive the secrets MA1 and MA^ independently - at different times
-
Alice will receive the secrets MA1 and MA^ independently - at different times.
-
-
-
-
44
-
-
84952972866
-
-
Similarly S5 is not strictly a prerequisite for step S6
-
Similarly S5 is not strictly a prerequisite for step S6.
-
-
-
-
45
-
-
84952956094
-
-
In practice there may be multiple sets of secrets corresponding to multiple gateways
-
In practice there may be multiple sets of secrets corresponding to multiple gateways.
-
-
-
-
46
-
-
84952966140
-
-
After allA-RPS is exactly identical to the broadcast authentication scheme by Canetti et al. (1999) - only that in the SCMB it is primarily used for different purposes
-
After allA-RPS is exactly identical to the broadcast authentication scheme by Canetti et al. (1999) - only that in the SCMB it is primarily used for different purposes.
-
-
-
-
47
-
-
84952960791
-
-
However, for broadcast messages the same strategies may not be appropriate. They may contain more fields to indicate the classification, key words etc., apart from the source of the broadcast
-
However, for broadcast messages the same strategies may not be appropriate. They may contain more fields to indicate the classification, key words etc., apart from the source of the broadcast.
-
-
-
|