-
1
-
-
33947428405
-
Source coding for campbell's penalties
-
Baer, M.: Source coding for campbell's penalties. IEEE Transactions on Information Theory 52(10), 4380-4393 (2006)
-
(2006)
IEEE Transactions on Information Theory
, vol.52
, Issue.10
, pp. 4380-4393
-
-
Baer, M.1
-
2
-
-
85030481487
-
How to broadcast a secret
-
Davies, D.W, ed, EUROCRYPT 1991, Springer, Heidelberg
-
Berkovits, S.: How to broadcast a secret. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 535-541. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.547
, pp. 535-541
-
-
Berkovits, S.1
-
4
-
-
0032627571
-
Key management for secure internet multicast using boolean function minimization techniques
-
Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: Proceedings of IEEE INFOCOMM 1999, vol. 2, pp. 689-698 (1999)
-
(1999)
Proceedings of IEEE INFOCOMM
, vol.2
, pp. 689-698
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
5
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proceedings of INFOCOMM 1999, pp. 708-716 (1999)
-
(1999)
Proceedings of INFOCOMM
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 459-474. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
8
-
-
0031641387
-
Efficient security for large and dynamic multicast groups
-
Caronni, G., Waldvogel, M., Sun, D., Plattner, B.: Efficient security for large and dynamic multicast groups. In: IEEE 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 1998) (1998)
-
(1998)
IEEE 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE
-
-
Caronni, G.1
Waldvogel, M.2
Sun, D.3
Plattner, B.4
-
9
-
-
51249175955
-
Families of finite subsets in which no set is covered by the union of r others
-
Erdos, P., Frankl, P., Furedi, Z.: Families of finite subsets in which no set is covered by the union of r others. Israel Journal of Mathematics (51), 75-89 (1985)
-
(1985)
Israel Journal of Mathematics
, vol.51
, pp. 75-89
-
-
Erdos, P.1
Frankl, P.2
Furedi, Z.3
-
10
-
-
84979291225
-
Broadcast encryption
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480-491. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
11
-
-
24944584332
-
Efficient tree-based revocation in groups of low-state devices
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Goodrich, M.T., Sun, J.Z., Tamassia, R.: Efficient tree-based revocation in groups of low-state devices. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 511-527. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 511-527
-
-
Goodrich, M.T.1
Sun, J.Z.2
Tamassia, R.3
-
12
-
-
33750079254
-
-
Hwang, Y.H., Lee, P.J.: Efficient broadcast encryption scheme with log-key storage. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, 4107, pp. 281-295. Springer, Heidelberg (2006)
-
Hwang, Y.H., Lee, P.J.: Efficient broadcast encryption scheme with log-key storage. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 281-295. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
33745140894
-
Generic transformation for scalable broadcast encryption schemes
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Hwang, J.Y., Lee, D.H., Lim, J.: Generic transformation for scalable broadcast encryption schemes. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 276-292. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 276-292
-
-
Hwang, J.Y.1
Lee, D.H.2
Lim, J.3
-
14
-
-
84937435227
-
The LSD broadcast encryption scheme
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 47-60. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 47-60
-
-
Halevy, D.1
Shamir, A.2
-
15
-
-
24944542406
-
One-way chain based broadcast encryption schemes
-
Cramer, R, ed, EURO-CRYPT 2005, Springer, Heidelberg
-
Jho, N., Hwang, J.Y., Cheon, J.H., Kim, M., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In: Cramer, R. (ed.) EURO-CRYPT 2005. LNCS, vol. 3494, pp. 559-574. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 559-574
-
-
Jho, N.1
Hwang, J.Y.2
Cheon, J.H.3
Kim, M.4
Lee, D.H.5
Yoo, E.S.6
-
17
-
-
25444488186
-
Optimal communication complexity of generic multicast key distribution
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Micciancio, D., Panjwani, S.: Optimal communication complexity of generic multicast key distribution. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 153-170. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 153-170
-
-
Micciancio, D.1
Panjwani, S.2
-
18
-
-
84880852861
-
-
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, 2139, pp. 41-62. Springer, Heidelberg (2001), Full version, http://www.wisdom.weizmann.ac. il/~naor/
-
Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 41-62. Springer, Heidelberg (2001), Full version, http://www.wisdom.weizmann.ac. il/~naor/
-
-
-
-
19
-
-
0035504627
-
An information theoretic analysis of rooted-tree based secure multicast key distribution schemes
-
Poovendran, R., Baras, J.S.: An information theoretic analysis of rooted-tree based secure multicast key distribution schemes. IEEE Transactions on Information Theory 47(7), 2824-2834 (2001);
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.7
, pp. 2824-2834
-
-
Poovendran, R.1
Baras, J.S.2
-
20
-
-
70549086673
-
-
Preliminary version In: Wiener, M. (ed.) CRYPTO 1999. LNCS, 1666, p. 624. Springer, Heidelberg (1999)
-
Preliminary version In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, p. 624. Springer, Heidelberg (1999)
-
-
-
-
21
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5), 444-458 (2003)
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
22
-
-
0035001560
-
A lower bound for multicast key distribution
-
Snoeyink, J., Suri, S., Varghese, G.: A lower bound for multicast key distribution. In: Proceedings of IEEE INFOCOMM 2001, pp. 422-431 (2001)
-
(2001)
Proceedings of IEEE INFOCOMM
, pp. 422-431
-
-
Snoeyink, J.1
Suri, S.2
Varghese, G.3
-
23
-
-
0002360030
-
Secure group communications using key graphs
-
ACM, New York
-
Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. In: Proceedings ACM SIGCOMM 1998. ACM, New York (1998)
-
(1998)
Proceedings ACM SIGCOMM
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
24
-
-
0003978251
-
-
RFC 2627, National Security Agency June
-
Wallner, D., Hardler, E., Agee, R.: Key management for multicast: Issues and architectures. RFC 2627, National Security Agency (June 1999)
-
(1999)
Key management for multicast: Issues and architectures
-
-
Wallner, D.1
Hardler, E.2
Agee, R.3
|