-
1
-
-
0037720620
-
Data broadcast
-
I. Stojmenovic, ed., John Wiley & Sons
-
J. Xu, D. Lee, Q. Hu, and W.-C. Lee, "Data Broadcast," Handbook of Wireless Networks and Mobile Computing, I. Stojmenovic, ed., John Wiley & Sons, pp. 243-265, 2002.
-
(2002)
Handbook of Wireless Networks and Mobile Computing
, pp. 243-265
-
-
Xu, J.1
Lee, D.2
Hu, Q.3
Lee, W.-C.4
-
3
-
-
0035001560
-
A lower bound for multicast key distribution
-
J. Snoeyink, S. Suri, and G. Varghese, "A Lower Bound for Multicast Key Distribution," Proc. IEEE INFOCOM '01, vol.1, pp. 422-431, 2001.
-
(2001)
Proc. IEEE INFOCOM '01
, vol.1
, pp. 422-431
-
-
Snoeyink, J.1
Suri, S.2
Varghese, G.3
-
4
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting," Proc. ACM SIGCOMM '97, pp. 277-288, 1997.
-
(1997)
Proc. ACM SIGCOMM '97
, pp. 277-288
-
-
Mittra, S.1
-
5
-
-
0032178082
-
Secure group communications using keygraphs
-
C.K. Wong, M. Gouda, and S.S. Lam, "Secure Group Communications Using Key Graphs," Proc. ACMSIGCOMM'98, pp.68-79, 1998.
-
(1998)
Proc. ACMSIGCOMM'98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
6
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups," Proc. Seventh ACM Conf. Computer and Comm. Security, pp. 235-244, 2000.
-
(2000)
Proc. Seventh ACM Conf. Computer and Comm. Security
, pp. 235-224
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
7
-
-
0033690786
-
Kronos: A scalable group rekeying approach for secure multicast
-
S. Setia, S. Koussih, S. Jajodia, and E. Harder, "Kronos: A Scalable Group Rekeying Approach for Secure Multicast," Proc. IEEE Symp. Security and Privacy, pp. 215-228, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
, pp. 215-228
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
8
-
-
0034780938
-
Reliable group rekeying: A performance analysis
-
Y.R. Yang, X.S. Li, X.B. Zhang, and S.S. Lam, "Reliable Group Rekeying: A Performance Analysis," Proc. ACM SIGCOMM '01, pp. 27-38, 2001.
-
(2001)
Proc. ACM SIGCOMM '01
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
-
9
-
-
18144403493
-
Reliable group rekeying with a customer perspective
-
M. Onen and R. Molva, "Reliable Group Rekeying with a Customer Perspective," Proc. IEEE Global Telecom. Conf., vol.4, pp. 2072-2076, 2004.
-
(2004)
Proc. IEEE Global Telecom. Conf.
, vol.4
, pp. 2072-2076
-
-
Onen, M.1
Molva, R.2
-
10
-
-
84957656774
-
Marks: Zero side effect multicast key management using arbitrarily revealed key sequences
-
B. Briscoe, "Marks: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences," Proc. First Int'l Workshop Networked Group Comm., pp. 301-320, 1999.
-
(1999)
Proc. First Int'l Workshop Networked Group Comm.
, pp. 301-320
-
-
Briscoe, B.1
-
11
-
-
84975035144
-
Key management for encrypted broadcast
-
A. Wool, "Key Management for Encrypted Broadcast," ACM Trans. Information and System Security, vol.3, no.2, pp. 107-134, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.2
, pp. 107-134
-
-
Wool, A.1
-
12
-
-
0343017090
-
On key distribution via true broadcasting
-
M. Just, E. Kranakis, D. Krizanc, and P.V. Oorschot, "On Key Distribution via True Broadcasting," Proc. Second ACM Conf. Computer and Comm. Security, pp. 81-88, 1994.
-
(1994)
Proc. Second ACM Conf. Computer and Comm. Security
, pp. 81-88
-
-
Just, M.1
Kranakis, E.2
Krizanc, D.3
Oorschot, P.V.4
-
16
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Advances in Cryptology-Proc. 21st Ann. Int'l Cryptology Conf., pp. 41-62, 2001.
-
(2001)
Advances in Cryptology-Proc. 21st Ann. Int'l Cryptology Conf.
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
19
-
-
84869697283
-
-
Irdeto Access, http://www.irdeto.com/index.html , 2006.
-
(2006)
-
-
-
20
-
-
2942678810
-
Analysis of the nagravision video scrambling method
-
Univ. of Cambridge
-
M.G. Kuhn, "Analysis of the Nagravision Video Scrambling Method," technical report, Univ. of Cambridge, 1998.
-
(1998)
Technical Report
-
-
Kuhn, M.G.1
-
21
-
-
84869701479
-
-
Viaccess, http://www.viaccess.com/en/ , 2006.
-
(2006)
-
-
-
22
-
-
84869710923
-
-
NDS Videoguard: Security, Flexibility, and Growth, http://www . ndsworld.com/conditional-access/conditional-access.html, 2006.
-
(2006)
-
-
-
23
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast Security: A Taxonomy and Some Efficient Constructions," Proc. IEEE INFOCOM '99, vol.2, pp. 708-716, 1999.
-
(1999)
Proc. IEEE INFOCOM '99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
24
-
-
0034838199
-
ELK: A new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, and D. Tygar, "ELK: A New Protocol for Efficient Large-Group Key Distribution," Proc. IEEE Symp. Security and Privacy, pp. 247-262, 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, D.3
-
27
-
-
0036086453
-
Self-healing key distribution with revocation
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, and D. Dean, "Self-Healing Key Distribution with Revocation," Proc. IEEE Symp. Security and Privacy, pp. 241-257, 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 241-257
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
28
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
Y. Sun and K.R. Liu, "Scalable Hierarchical Access Control in Secure Group Communications," Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Sun, Y.1
Liu, K.R.2
|