-
1
-
-
0004198635
-
-
3rd Edition, Prentice Hall, ISBN: 0-13-035548-8
-
C. P. Pfleeger, and S. L. Pfleeger, "Security in Computing," 3rd Edition, Prentice Hall, 2003, ISBN: 0-13-035548-8.
-
(2003)
Security in Computing
-
-
Pfleeger, C.P.1
Pfleeger, S.L.2
-
2
-
-
23944434871
-
-
Springer, ISBN: 0-387-22970-1
-
X. Zou, B. Ramamurthy, and S. Magliveras, "Secure Group Communication over Data Networks," Springer, 2004, ISBN: 0-387-22970-1.
-
(2004)
Secure Group Communication over Data Networks
-
-
Zou, X.1
Ramamurthy, B.2
Magliveras, S.3
-
3
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr, "Basic concepts and taxonomy of dependable and secure computing," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
4
-
-
32944479938
-
Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast
-
G. Badishi, I. Keidar, and A. Sasson, "Exposing and eliminating vulnerabilities to denial of service attacks in secure gossip-based multicast," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 1, pp. 45-61, 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 45-61
-
-
Badishi, G.1
Keidar, I.2
Sasson, A.3
-
5
-
-
0031641387
-
Efficient security for large and dynamic multicast groups
-
G. Caronni, K. Waldvogel, D. Sun, and B. Plattner, "Efficient security for large and dynamic multicast groups," Proceedings of the Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 376-383, 1998.
-
(1998)
Proceedings of the Seventh IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 376-383
-
-
Caronni, G.1
Waldvogel, K.2
Sun, D.3
Plattner, B.4
-
6
-
-
84942438500
-
Batch Rekeying for Secure Group Communications
-
X. S. Li, Y. R. Yang, M. Gouda, and S. Lam, "Batch Rekeying for Secure Group Communications," Proc. 10th Int'l WWW Conf., pp. 525-534, 2001.
-
(2001)
Proc. 10th Int'l WWW Conf
, pp. 525-534
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.3
Lam, S.4
-
7
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
D. Liu, P. Ning, and K. Sun, "Efficient self-healing group key distribution with revocation capability," ACM CCS, pp. 231-240, 2003.
-
(2003)
ACM CCS
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
8
-
-
34147147912
-
Dynamic Balanced Key Tree Management for Secure Multicast Communications
-
W. H. D. Ng, M. Howarth, Z. Sun, and H. Cruickshank, "Dynamic Balanced Key Tree Management for Secure Multicast Communications," IEEE Transactions on Computers, 56(5), pp. 577-589, 2007.
-
(2007)
IEEE Transactions on Computers
, vol.56
, Issue.5
, pp. 577-589
-
-
Ng, W.H.D.1
Howarth, M.2
Sun, Z.3
Cruickshank, H.4
-
9
-
-
0036353679
-
Key Management for Simultaneous Join/Leave in Secure Multicast
-
G. Noubir, F. Zhu, and A. H. Chan, "Key Management for Simultaneous Join/Leave in Secure Multicast," IEEE International Symposium on Information Theory, pp. 325-330, 2002.
-
(2002)
IEEE International Symposium on Information Theory
, pp. 325-330
-
-
Noubir, G.1
Zhu, F.2
Chan, A.H.3
-
11
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networks, 8(1): 16-30, 2000.
-
(2000)
IEEE/ACM Transactions on Networks
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
12
-
-
0030609312
-
-
S. Mittra, Iolus: A framework for scalable secure multicasting, J. of Computer Communication Reviews, 27(4):277-288, 1997.
-
S. Mittra, "Iolus: A framework for scalable secure multicasting," J. of Computer Communication Reviews, 27(4):277-288, 1997.
-
-
-
-
13
-
-
3042583499
-
Secure Group Communication Using Robust Contributory Key Agreement
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. L. Schultz, J. Stanton, and G. Tsudik, "Secure Group Communication Using Robust Contributory Key Agreement," IEEE Transactions on Parallel Distrib. Syst., 15(5), pp. 468-480, 2004.
-
(2004)
IEEE Transactions on Parallel Distrib. Syst
, vol.15
, Issue.5
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.L.4
Stanton, J.5
Tsudik, G.6
-
14
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and revocation of cryptographic keys in sensor networks," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, pp. 233 - 247, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
15
-
-
0033689166
-
DISEC: A distributed framework for scalable secure many-to-many communication
-
D. R. Dondeti, S. Mukherjee, and A. Samal, "DISEC: a distributed framework for scalable secure many-to-many communication," In Proceedings of fifth IEEE Symposium on Computers and Communications (ISCC 2000), pp. 693-698, 2000.
-
(2000)
Proceedings of fifth IEEE Symposium on Computers and Communications (ISCC
, pp. 693-698
-
-
Dondeti, D.R.1
Mukherjee, S.2
Samal, A.3
-
16
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," ACM Transactions on Information and Systems Security, 7(1):60-96, 2004.
-
(2004)
ACM Transactions on Information and Systems Security
, vol.7
, Issue.1
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
15244360279
-
An Efficient Key Pre-Distribution Scheme for Ad-Hoc Network Security
-
M. Ramkumar, and N. Memon, "An Efficient Key Pre-Distribution Scheme for Ad-Hoc Network Security," IEEE Journal on Selected Areas in Communication., 23(3):611-621, 2005.
-
(2005)
IEEE Journal on Selected Areas in Communication
, vol.23
, Issue.3
, pp. 611-621
-
-
Ramkumar, M.1
Memon, N.2
-
18
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
CCS, pp
-
M. Steiner, G. Tsudik, and M.Waidner, "Diffie-Hellman key distribution extended to group communication," ACM Conference on Computer and Communications Security (CCS), pp. 31-37, 1996.
-
(1996)
ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
19
-
-
0036286367
-
A time-efficient contributory key agreement scheme for secure group communications
-
B. Sun, W. Trappe, Y. Sun, and K. J. R. Liu, "A time-efficient contributory key agreement scheme for secure group communications," Proceedings of IEEE International Conference on Communications, vol. 2, pp. 1159-1163, 2002.
-
(2002)
Proceedings of IEEE International Conference on Communications
, vol.2
, pp. 1159-1163
-
-
Sun, B.1
Trappe, W.2
Sun, Y.3
Liu, K.J.R.4
-
20
-
-
27544461415
-
DGKD: Distributed Group Key Distribution with Authentication Capability
-
P. Adusumilli, X. Zou, and B. Ramamurthy, "DGKD: Distributed Group Key Distribution with Authentication Capability," Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 476-481, 2005.
-
(2005)
Proceedings of the IEEE Workshop on Information Assurance and Security
, pp. 476-481
-
-
Adusumilli, P.1
Zou, X.2
Ramamurthy, B.3
-
22
-
-
0024715386
-
Secure broadcasting using the Secure Lock
-
G. H. Chiou, and W. T. Chen, "Secure broadcasting using the Secure Lock," IEEE Transactions on Software Engineering, 15(8):929-934, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.H.1
Chen, W.T.2
-
23
-
-
0036375297
-
Key trees and the security of interval multicast
-
M. G. Gouda, C.-T. Huang, and E. N. Elnozahy, "Key trees and the security of interval multicast," Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 467-468, 2002.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems
, pp. 467-468
-
-
Gouda, M.G.1
Huang, C.-T.2
Elnozahy, E.N.3
-
24
-
-
0001720832
-
Generalied beimelchor scheme for broadcast encryption and interactive key distribution
-
C. Blundo, L. A. F. Mattos, and D. R. Stinson, "Generalied beimelchor scheme for broadcast encryption and interactive key distribution," Theoretical Computer Science, vol. 200, pp. 313-334, 1998.
-
(1998)
Theoretical Computer Science
, vol.200
, pp. 313-334
-
-
Blundo, C.1
Mattos, L.A.F.2
Stinson, D.R.3
-
25
-
-
0034238689
-
Key management for restricted multicast using broadcast encryption
-
M. Abdalla, Y. Shavitt, and A. Wool., "Key management for restricted multicast using broadcast encryption," IEEE/ACM Transactions on Networking, 8(4):443-454, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.4
, pp. 443-454
-
-
Abdalla, M.1
Shavitt, Y.2
Wool, A.3
-
26
-
-
0037810691
-
A practical revocation scheme for broadcast encryption using smart cards
-
N. Kogan, Y. Shavitt, and A. Wool, "A practical revocation scheme for broadcast encryption using smart cards," Proceedings of the IEEE Symposium on Security and Privacy (SP03), pp. 225-235, 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy (SP03)
, pp. 225-235
-
-
Kogan, N.1
Shavitt, Y.2
Wool, A.3
-
28
-
-
84976752387
-
A cryptographic solution to the problem of access control in a hierarchy
-
S. G. AkI, and P. D. Taylor, "A cryptographic solution to the problem of access control in a hierarchy," ACM Transactions on Computer Systems, pp. 239-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, pp. 239-248
-
-
AkI, S.G.1
Taylor, P.D.2
-
29
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S. T. Mackinnon, P. D. Taylor, H. Meijer, and S. G. Akl, "An optimal algorithm for assigning cryptographic keys to control access in a hierarchy," IEEE Transactions on Computers, vol. 34, no. 9, pp. 797-802, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.T.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
30
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
M. J. Atallah, K. B. Frikken, and M. Blanton, "Dynamic and efficient key management for access hierarchies," Proceedings of the tenth ACM Conference on Computer and Communication Security (CCS' 05), pp. 190-202, 2005.
-
(2005)
Proceedings of the tenth ACM Conference on Computer and Communication Security (CCS' 05)
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
31
-
-
84894043862
-
Flexible access control with master keys
-
Advances in Cryptology: CRYPTO'89
-
G. C. Chick, and S. E. Tavares, "Flexible access control with master keys," Advances in Cryptology: CRYPTO'89 LNCS, vol. 435, pp. 316-322, 1990.
-
(1990)
LNCS
, vol.435
, pp. 316-322
-
-
Chick, G.C.1
Tavares, S.E.2
-
32
-
-
33745792230
-
Hierarchical key management scheme using polynomial interpolation
-
M. L. Das, A. Saxena, V. P. Gulati, and D. B. Phatak, "Hierarchical key management scheme using polynomial interpolation," SIGOPS Operating Systems Review, pp. 40-47, 2005.
-
(2005)
SIGOPS Operating Systems Review
, pp. 40-47
-
-
Das, M.L.1
Saxena, A.2
Gulati, V.P.3
Phatak, D.B.4
-
33
-
-
0028513932
-
Access control: Principle and practice
-
R. S. Sandhu, and P. Samarati, "Access control: principle and practice," IEEE Communications Magazine, 32(9):40-48, 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
35
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
36
-
-
18744416849
-
On permissions, inheritance and role hierarchies
-
J. Crampton, "On permissions, inheritance and role hierarchies," ACM CCS'03, pp. 85-92, 2003.
-
(2003)
ACM CCS'03
, pp. 85-92
-
-
Crampton, J.1
|