-
1
-
-
0023408117
-
Processing encrypted data
-
Sept
-
N. Ahituv, Y. Lapid, and S. Neumann, "Processing Encrypted Data", Communications of ACM, vol. 20, no. 9, p. 777-780, Sept 1987.
-
(1987)
Communications of ACM
, vol.20
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
2
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
April
-
G. Ateniese, M. Steiner, and G. Tsudik. a "New multiparty authentication Services and key agreement protocols", IEEE Journal on Selected Areas in Communications, 18, no. 4, p. 628-640, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 628-640
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
3
-
-
0032218239
-
Communication complexity of group key distribution
-
Nov.
-
K. Becker, and U. Wille, "Communication complexity of group key distribution", in proc. ACM CCS'98, Nov. 1998, p. 1-6.
-
(1998)
Proc. ACM CCS'98
, pp. 1-6
-
-
Becker, K.1
Wille, U.2
-
4
-
-
84884730529
-
An optimal class of symmetric key generation system
-
LNCS
-
R. Blom, "An Optimal Class of Symmetric Key Generation System", in Advances in Cryptology - Eurocrypt'84, LNCS vol. 209, p. 335-338, 1985.
-
(1985)
Advances in Cryptology - Eurocrypt'84
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
84948984838
-
Space requirements for broadcast encryption
-
LNCS
-
C. Blundo, and A. Cresti, "Space requirements for broadcast encryption", in Advances in Cryptology - Eurocrypt'94, LNCS vol. 950, p. 471-486, 1994.
-
(1994)
Advances in Cryptology - Eurocrypt'94
, vol.950
, pp. 471-486
-
-
Blundo, C.1
Cresti, A.2
-
6
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
LNCS
-
C. Blundo, A. De Santi, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure Key Distribution for Dynamic Conferences", in Advances in Cryptogolosy - Crypto'92, LNCS vol. 740, p. 471-486, 1993.
-
(1993)
Advances in Cryptogolosy - Crypto'92
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santi, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
8
-
-
0000288916
-
A secure and efficient conference key distribution system
-
May
-
M. Burmester, and Y. Desmedt. "A secure and efficient conference key distribution system'', in proc. Eurocrypt'1994. May 1994, p. 275-286.
-
(1994)
Proc. Eurocrypt'1994
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
9
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. "Multicast security: A taxonomy and some efficient constructions", in Proc. IEEE INFOCOM99, 1999.
-
(1999)
Proc. IEEE INFOCOM99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
12
-
-
0035728669
-
Secure Group Communications for Wireless Networks
-
Oct.
-
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang. "Secure Group Communications for Wireless Networks", in proc. IEEE MILCOM01, Oct. 2001.
-
(2001)
Proc. IEEE MILCOM01
-
-
Decleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
Towsley, D.7
Vasudevan, S.8
Zhang, C.9
-
13
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie, and M. E. Hellman. "New Directions in Cryptography", IEEE Trans. Inform. Theory, IT-22, p. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
14
-
-
51249175955
-
Families of finite sets in which no set is covered by the union of r others
-
1985
-
P. Erdös, P. Frankl, and Z. Füredi. "Families of finite sets in which no set is covered by the union of r others", Israel Journal of Mathematics vol. 51 (1985), no. 1-2. p.75-89, 1985.
-
(1985)
Israel Journal of Mathematics
, vol.51
, Issue.1-2
, pp. 75-89
-
-
Erdös, P.1
Frankl, P.2
Füredi, Z.3
-
15
-
-
0038341106
-
A Key-management scheme for distributed sensor networks
-
Nov.
-
L. Eschenauer, and V. D. Gligor. "A Key-Management Scheme for Distributed Sensor Networks", in proc. ACM CCS'02, Nov. 2002.
-
(2002)
Proc. ACM CCS'02
-
-
Eschenauer, L.1
Gligor, V.D.2
-
17
-
-
1442334736
-
-
S. P. Griffin, B. T. DeCleene, L. R. Dondeti, R. M. Flynn, D. Kiwior, and A. Olbert. "Hierarchical Key Management for Mobile Multicast Members", 2002.
-
(2002)
Hierarchical Key Management for Mobile Multicast Members
-
-
Griffin, S.P.1
Decleene, B.T.2
Dondeti, L.R.3
Flynn, R.M.4
Kiwior, D.5
Olbert, A.6
-
19
-
-
0020180459
-
A conference key distribution system
-
Sept.
-
I. Ingemarsson, D. T. Tang, and C. K. Wong. "A conference key distribution system", IEEE Trans. on IT, vol. 28, no. 5, p. 714-720, Sept. 1982.
-
(1982)
IEEE Trans. on IT
, vol.28
, Issue.5
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.T.2
Wong, C.K.3
-
21
-
-
0003237987
-
The kerberos network authentication service (V5)
-
September
-
J. Kohl, and B. Neuman. "The Kerberos Network Authentication Service (V5), RFC 1510, September, 1993.
-
(1993)
RFC
, vol.1510
-
-
Kohl, J.1
Neuman, B.2
-
22
-
-
85027184925
-
Coding constructions for blacklisting problems without computational assumptions
-
R. Kumar, S. Rajagopalan, and A. Sahai. "Coding constructions for blacklisting problems without computational assumptions", in Crypto'99, 1999.
-
(1999)
Crypto'99
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
23
-
-
84989455644
-
On the key predistribution systems: A practical solution to the key distribution problem
-
LNCS
-
T. Matsumoto, and H. Imai. "On the key predistribution systems: A practical solution to the key distribution problem", in Advances in Cryptology - Crypto'87, LNCS vol. 293, p. 185-193, 1988.
-
(1988)
Advances in Cryptology - Crypto'87
, vol.293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
26
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
LNCS
-
D. Naor, M. Naor, and J. Lotspiech. "Revocation and Tracing Schemes for Stateless Receivers", in Advances in Cryptology - Crypto'01, LNCS vol. 2139, p. 41-62, 2001.
-
(2001)
Advances in Cryptology - Crypto'01
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
27
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham, and M. Schroeder. "Using Encryption for Authentication in Large Networks of Computers", in Commu. of ACM, vol. 21, no. 12. p. 993-999, 1978.
-
(1978)
Commu. of ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
28
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
LNCS
-
P. Paillier. "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes", in Advances in Cryptoloay - Eurocrypt'99, LNCS vol. 1592, p. 223-238, 1999.
-
(1999)
Advances in Cryptoloay - Eurocrypt'99
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
29
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. "SPINS: Security Protocols for Sensor Networks", in proc. ACM MOBICOM'2001, July 2001.
-
(2001)
Proc. ACM MOBICOM'2001
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
30
-
-
0003582910
-
-
Addison Wesley Professional, Dec.
-
C. E. Perkins. Ad Hoc Networking. Addison Wesley Professional, Dec. 2000.
-
(2000)
Ad Hoc Networking
-
-
Perkins, C.E.1
-
31
-
-
0005301490
-
On data banks and privacy homomorphisms
-
Academic Press
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos. "On Data Banks and Privacy Homomorphisms", in Foundations of Secure Computation, Academic Press, p. 169-179, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-179
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
|