-
1
-
-
0031629148
-
Cliques: A new approach to group key agreement
-
M.Steiner, G. Tsudik and M. Wadner, " Cliques: A new approach to group key agreement" in Proc IEEE ICDCS, 1998,pp.380-387.
-
(1998)
Proc IEEE ICDCS
, pp. 380-387
-
-
Steiner, M.1
Tsudik, G.2
Wadner, M.3
-
2
-
-
52249090613
-
The Design of Cluster based group key Management system in wireless networks
-
Y.J.Chen,Y.L.Wang, "The Design of Cluster based group key Management system in wireless networks" in proc IEEE,2005
-
(2005)
proc IEEE
-
-
Chen, Y.J.1
Wang, Y.L.2
-
3
-
-
52249087080
-
-
D. Balenson, D.Mcgew, A. Sherman, Key management for large dynamic groups: One way function trees and amortized initialization in IETF, Feb 1999.
-
D. Balenson, D.Mcgew, A. Sherman, "Key management for large dynamic groups: One way function trees and amortized initialization" in IETF, Feb 1999.
-
-
-
-
4
-
-
27644534176
-
Secure spread: An integrated architecture for secure group communication
-
Y.Amir, C.Nita Rotaru, G. Tsudik, " Secure spread: An integrated architecture for secure group communication" IEEE transactions on dependable and secure computing vol. 2, no. 3, 2005, pp. 248-261
-
(2005)
IEEE transactions on dependable and secure computing
, vol.2
, Issue.3
, pp. 248-261
-
-
Amir, Y.1
Nita Rotaru, C.2
Tsudik, G.3
-
5
-
-
0032178082
-
Secure group communications using key graphs
-
sep
-
C.Wong, M. Gouda and S.Lam, "Secure group communications using key graphs" in proc ACM SIGCOM, sep.,1998, pp. 68-79
-
(1998)
proc ACM SIGCOM
, pp. 68-79
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
6
-
-
0141770051
-
A common efficient group key agreement
-
Y.Kim, A. Perrig and G. Tsudik " A common efficient group key agreement" in proc IFTP-SEC.2001, pp. 229-244
-
(2001)
proc IFTP-SEC
, pp. 229-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
8
-
-
4444225744
-
On the performance of group key agreement protocols
-
Y. Amir, Y.Kim, C. Nita -Rotary, G. Tsudik " On the performance of group key agreement protocols" ACM Transactions on information and system security, vol. 7, no.3, 2004, pp. 457-488
-
(2004)
ACM Transactions on information and system security
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Nita -Rotary, C.3
Tsudik, G.4
-
9
-
-
84904254536
-
-
th annual working conference on information security, June 2001, pp. 229-244
-
th annual working conference on information security, June 2001, pp. 229-244
-
-
-
-
10
-
-
1642403770
-
Comparison of inter area rekeying algorithms for secure wireless group communication
-
C.Zhang, B.Decleene, J. Kurose, D.Towlesy "Comparison of inter area rekeying algorithms for secure wireless group communication" performance evaluation vol.49, no. 1-4, 2002, pp. 1-20
-
(2002)
performance evaluation
, vol.49
, Issue.1-4
, pp. 1-20
-
-
Zhang, C.1
Decleene, B.2
Kurose, J.3
Towlesy, D.4
-
12
-
-
0345427593
-
Using AVL trees for fault tolerant group key management Cornell university, computer science
-
O. Rodeh, K. Birman and D. Dolev " Using AVL trees for fault tolerant group key management" Cornell university, computer science, technical report, 2000
-
(2000)
technical report
-
-
Rodeh, O.1
Birman, K.2
Dolev, D.3
-
13
-
-
85088178321
-
-
th international Conference on distributed computing system workshops, 2004
-
th international Conference on distributed computing system workshops, 2004
-
-
-
|