-
1
-
-
84956868427
-
A quick group key distribution scheme with entity revoca-tion
-
Singapore, Novem-ber Springer-Verlog
-
J. Anzai, N. Matsuzaki, and T. Matsumoto, "A quick group key distribution scheme with entity revoca-tion," in The Proceedings of Advances in Cryptol-ogy - ASIACRYPT'99, vol. 1716 of Lecture Notes in Computer Science, pp. 333-347, Singapore, Novem-ber 1999. Springer-Verlog.
-
(1999)
The Proceedings of Advances in Cryptol-ogy - ASIACRYPT'99, of Lecture Notes in Computer Science
, vol.1716
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
3
-
-
84979291225
-
Broadcast encryption
-
Springer-Verlog
-
A. Fiat and M. Naor, "Broadcast encryption," in The Proceedings of Advances in Cryptology -CRYPTO'93, vol. 773 of Lecture Notes in Computer Science, pp. 480-491. Springer-Verlog, 1994.
-
(1994)
The Proceedings of Advances in Cryptology -CRYPTO'93, of Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
4
-
-
84937435227
-
The LSD broadcast en-cryption scheme
-
Springer-Verlog
-
D. Halvey and A. Shamir, "The LSD broadcast en-cryption scheme," in The Proceedings of Advances in Cryptology - Crypto'02, vol. 2442 of Lecture Notes in Computer Science, pp. 47-60. Springer-Verlog, 2002.
-
(2002)
The Proceedings of Advances in Cryptology - Crypto'02, of Lecture Notes in Computer Science
, vol.2442
, pp. 47-60
-
-
Halvey, D.1
Shamir, A.2
-
5
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
Washington D.C., USA, October ACM Press
-
D. Liu, P. Ning and K. Sun, "Efficient self-healing group key distribution with revocation capability," in The Proceedings of 10th ACM Conference on Computer and Communications Security - CCS'03, pp. 231-240, Washington D.C., USA, October 2003. ACM Press.
-
(2003)
The Proceedings of 10th ACM Conference on Computer and Communications Security - CCS'03
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
6
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Springer-Verlog
-
D. Naor, M. Naor and J. Lotspiech, "Revocation and tracing schemes for stateless receivers," in The Pro-ceedings of Advances in Cryptology 2001 - Crypto'01, Lecture Notes in Computer Science, pp. 41-62. Springer-Verlog, 2001.
-
(2001)
The Pro-ceedings of Advances in Cryptology 2001 - Crypto'01, Lecture Notes in Computer Science
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
7
-
-
84944319284
-
Efficient trace and revoke schemes
-
Anguilla, British West Indies, February Springer-Verlog
-
M. Naor and B. Pinkas, "Efficient trace and revoke schemes," in The Proceedings of Financial Cryptog-raphy 2000, vol. 1962 of Lecture Notes in Computer Science, pp. 1-20, Anguilla, British West Indies, February 2000. Springer-Verlog.
-
(2000)
The Proceedings of Financial Cryptog-raphy 2000, of Lecture Notes in Computer Science
, vol.1962
, pp. 1-20
-
-
Naor, M.1
Pinkas, B.2
-
8
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song and J. D. Tygar, "ELK, a new protocol for efficient large-group key distribution," in The Proceedings of IEEE Symposium on Security and Privacy, pp. 247-262, 2001.
-
(2001)
The Proceedings of IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
9
-
-
18844424009
-
Efficient state updates for key manage-ment
-
June
-
B. Pinkas, "Efficient state updates for key manage-ment," Proceedings of the IEEE, Special Issue on En-abling Technologies for Digital Rights Management, vol. 92(6), pp. 910-917, June 2004.
-
(2004)
Proceedings of the IEEE, Special Issue on En-abling Technologies for Digital Rights Management
, vol.92
, Issue.6
, pp. 910-917
-
-
Pinkas, B.1
-
10
-
-
2642549675
-
Cryptosys-tems based on pairing
-
Okinawa, Japan, January
-
R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosys-tems based on pairing," in The Proceedings of the 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, January 2000.
-
(2000)
The Proceedings of the 2000 Symposium on Cryptography and Information Security
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
11
-
-
79952238646
-
Self-healing key distribution with revocation
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean, "Self-healing key distribution with revocation," in The Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 224-240, 2002.
-
(2002)
The Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 224-240
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
13
-
-
0032178082
-
Secure group communications using key graphs
-
Vancouver, BC, Canada
-
C. K. Wong, M. Gouda and S. Lam, "Secure group communications using key graphs," in The Proceed-ings of ACM SIGCOMM'98, vol. 28(4), pp. 68-79, Vancouver, BC, Canada, 1998.
-
(1998)
The Proceed-ings of ACM SIGCOMM'98
, vol.28
, Issue.4
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
-
14
-
-
0038741385
-
Keystone: A group key management service
-
Acapulco, Mexico, May
-
C. K. Wong and S. Lam, "Keystone: A group key management service," in The Proceedings of Interna-tional Conference on Telecommunications - ICT'00, pp. 1-6, Acapulco, Mexico, May 2000.
-
(2000)
The Proceedings of Interna-tional Conference on Telecommunications - ICT'00
, pp. 1-6
-
-
Wong, C.K.1
Lam, S.2
-
15
-
-
0034780938
-
Reliable group rekeying: A performance analysis
-
San Diego, CA, USA, August 2001
-
Y. Yang, X. Li, X. Zhang, and S. Lam, "Reliable group rekeying: A performance analysis," in The Proceedings of ACM SIGCOMM'01, pp. 27-38, San Diego, CA, USA, August 2001.
-
The Proceedings of ACM SIGCOMM'01
, pp. 27-38
-
-
Yang, Y.1
Li, X.2
Zhang, X.3
Lam, S.4
|