-
1
-
-
85030481487
-
How to broadcast a secret
-
Advances in Cryptology, Springer-Verlag
-
Berkovit S. How to broadcast a secret. Advances in Cryptology. Eurocrypt'91, LNCS vol. 547 (1991), Springer-Verlag 536-541
-
(1991)
Eurocrypt'91, LNCS
, vol.547
, pp. 536-541
-
-
Berkovit, S.1
-
2
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
Springer-Verlag
-
Blundo C., De Santis A., Herzberg A., Kutten S., Vaccaro U., and Yung M. Perfectly-secure key distribution for dynamic conferences. Crypto'92, LNCS, vol. 740 (1993), Springer-Verlag 471-486
-
(1993)
Crypto'92, LNCS, vol. 740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
3
-
-
84955614214
-
Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution
-
Springer-Verlag
-
Blundo C., Mattos L.F., and Stinson D. Trade-offs between communication and storage in unconditionally secure schemes for broadcast encryption and interactive key distribution. Advances in Cryptology, Crypto'96, LNCS vol. 1109 (1996), Springer-Verlag
-
(1996)
Advances in Cryptology, Crypto'96, LNCS
, vol.1109
-
-
Blundo, C.1
Mattos, L.F.2
Stinson, D.3
-
6
-
-
33646153894
-
Definitions and bounds for self-healing key distribution
-
Proceedings of the 31st ICALP 04, Springer, Verlag
-
Blundo C., D'Arco P., Santis A., and Listo M. Definitions and bounds for self-healing key distribution. Proceedings of the 31st ICALP 04. LNCS vol. 3142 (2004), Springer, Verlag 234-245
-
(2004)
LNCS
, vol.3142
, pp. 234-245
-
-
Blundo, C.1
D'Arco, P.2
Santis, A.3
Listo, M.4
-
8
-
-
0032661699
-
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxonomy and some efficient constructions, in: IEEE INFOCOMM'99, 1999.
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, Multicast security: a taxonomy and some efficient constructions, in: IEEE INFOCOMM'99, 1999.
-
-
-
-
11
-
-
36349017874
-
Improved self-healing key distribution with revocation in wireless sensor network
-
IEEE Communications Society Press
-
Dutta R., and Mukhopadhyay S. Improved self-healing key distribution with revocation in wireless sensor network. Proceedings of WCNC 2007 - Networking (2007), IEEE Communications Society Press
-
(2007)
Proceedings of WCNC 2007 - Networking
-
-
Dutta, R.1
Mukhopadhyay, S.2
-
12
-
-
38049016463
-
Efficient self-healing key distributions with revocation for wireless network using one way key chains
-
Proceedings of the 5th ACNS 2007, Springer-Verlag
-
Dutta R., Chang E.-C., and Mukhopadhyay S. Efficient self-healing key distributions with revocation for wireless network using one way key chains. Proceedings of the 5th ACNS 2007. LNCS vol. 4521 (2007), Springer-Verlag
-
(2007)
LNCS
, vol.4521
-
-
Dutta, R.1
Chang, E.-C.2
Mukhopadhyay, S.3
-
13
-
-
44649127565
-
Generalized self-healing key distribution using vector space access structure
-
Springer-Verlag
-
Dutta R., Mukhopadhyay S., Das A., and Emmanuel S. Generalized self-healing key distribution using vector space access structure. Proceedings of IFIP Networking 2008, LNCS vol. 4982 (2008), Springer-Verlag
-
(2008)
Proceedings of IFIP Networking 2008, LNCS
, vol.4982
-
-
Dutta, R.1
Mukhopadhyay, S.2
Das, A.3
Emmanuel, S.4
-
14
-
-
84979291225
-
Broadcast encryption
-
Crypto'93, Springer-Verlag
-
Fiat A., and Naor M. Broadcast encryption. Crypto'93. LNCS vol. 773 (1994), Springer-Verlag 480-491
-
(1994)
LNCS
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
16
-
-
85027123825
-
New protocols for third-party-based authentication and secure broadcast
-
L. Gong, New protocols for third-party-based authentication and secure broadcast, in: Proceedings of ACM CCS, 1994.
-
(1994)
Proceedings of ACM CCS
-
-
Gong, L.1
-
18
-
-
27644512043
-
An efficient key distribution scheme with self-healing property
-
Hong D., and Kang J. An efficient key distribution scheme with self-healing property. IEEE Communication Letters'05 9 (2005) 759-761
-
(2005)
IEEE Communication Letters'05
, vol.9
, pp. 759-761
-
-
Hong, D.1
Kang, J.2
-
19
-
-
33750008721
-
Self-healing group key distribution with time-limited node revocation for wireless sensor networks
-
Jiang Y., Lin C., Shi M., and Shen X. Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5 1 (2007) 14-23
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 14-23
-
-
Jiang, Y.1
Lin, C.2
Shi, M.3
Shen, X.4
-
20
-
-
0343017090
-
On key distribution via true broadcasting
-
M. Just, E. Kranakis, D. Krizanc, P. van Oorschot, On key distribution via true broadcasting, in: Proceedings of ACM CCS, 1994.
-
(1994)
Proceedings of ACM CCS
-
-
Just, M.1
Kranakis, E.2
Krizanc, D.3
van Oorschot, P.4
-
21
-
-
38449117258
-
Secure group communication with self-healing and rekeying in wireless sensor networks
-
F. Kausar, S. Hassian, J.H. Park, A. Masood, Secure group communication with self-healing and rekeying in wireless sensor networks, in: Proceedings of the Third International Conference, MSN, 2007, pp. 737-748.
-
(2007)
Proceedings of the Third International Conference, MSN
, pp. 737-748
-
-
Kausar, F.1
Hassian, S.2
Park, J.H.3
Masood, A.4
-
22
-
-
26444491036
-
Efficient self-healing key distribution with revocation capability
-
D. Liu, P. Ning, K. Sun, Efficient self-healing key distribution with revocation capability, in: Proceedings of the 10th ACM CCS'03, 2003, pp. 27-31.
-
(2003)
Proceedings of the 10th ACM CCS'03
, pp. 27-31
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
23
-
-
0003557429
-
Key establishment in large dynamic groups using one-way function trees
-
No. 0755, 1998
-
D. McGrew, A. Sherman, Key establishment in large dynamic groups using one-way function trees, TIS Report No. 0755, 1998.
-
TIS Report
-
-
McGrew, D.1
Sherman, A.2
-
24
-
-
2642542617
-
Sliding-window self-healing key distribution with revocation
-
S. More, M. Malkin, J. Staddon, Sliding-window self-healing key distribution with revocation, in: ACM Workshop on Survivable and Self-regenerative Systems'03, 2003, pp. 82-90.
-
(2003)
ACM Workshop on Survivable and Self-regenerative Systems'03
, pp. 82-90
-
-
More, S.1
Malkin, M.2
Staddon, J.3
-
25
-
-
84880852861
-
Revocation and tracing schemes for stateless users
-
Advances of Cryptology - Crypto'01, Springer-Verlag
-
Naor D., Naor M., and Lotspiech J. Revocation and tracing schemes for stateless users. Advances of Cryptology - Crypto'01. LNCS vol. 2139 (2001), Springer-Verlag 41-62
-
(2001)
LNCS
, vol.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
26
-
-
0034838199
-
ELK, a new protocol for efficient large-group key distribution
-
A. Perrig, D. Song, J.D. Tygar, ELK, a new protocol for efficient large-group key distribution, in: Proceedings of IEEE Symposium on Security and Privacy'01, 2001, pp. 247-262.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy'01
, pp. 247-262
-
-
Perrig, A.1
Song, D.2
Tygar, J.D.3
-
27
-
-
0034315039
-
Secret sharing schemes with bipartite access structure
-
Padro C., and Saez G. Secret sharing schemes with bipartite access structure. IEEE Transactions on Information Theory 46 7 (2000) 2596-2604
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, Issue.7
, pp. 2596-2604
-
-
Padro, C.1
Saez, G.2
-
28
-
-
33646832603
-
On threshold self-healing key distribution schemes
-
Proceedings of Cryptography and Coding'04, Springer, Verlag
-
Saez G. On threshold self-healing key distribution schemes. Proceedings of Cryptography and Coding'04. LNCS vol. 3796 (2004), Springer, Verlag 340-354
-
(2004)
LNCS
, vol.3796
, pp. 340-354
-
-
Saez, G.1
-
29
-
-
0034448865
-
New constructions of secure multicast re-keying schemes using perfect hash families
-
R. Safavi-Naini, H. Wang, New constructions of secure multicast re-keying schemes using perfect hash families, in: Proceedings of ACM CCS'00, 2000, pp. 228-234.
-
(2000)
Proceedings of ACM CCS'00
, pp. 228-234
-
-
Safavi-Naini, R.1
Wang, H.2
-
30
-
-
77950019506
-
-
S. Setia, S. Koussih, S. Jajodia, Korons: a scalable group re-keying approach for secure multicast, in: Proceedings of IEEE Symp. on Security and Privacy
-
S. Setia, S. Koussih, S. Jajodia, Korons: a scalable group re-keying approach for secure multicast, in: Proceedings of IEEE Symp. on Security and Privacy.
-
-
-
-
31
-
-
79952238646
-
Self-healing key distribution with revocation
-
J. Staddon, S. Miner, M. Franklin, D. Balfanz, M. Malkin, D. Dean, Self-healing key distribution with revocation, in: Proceedings of IEEE Symposium on Security and Privacy'02, 2002, pp. 224-240.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy'02
, pp. 224-240
-
-
Staddon, J.1
Miner, S.2
Franklin, M.3
Balfanz, D.4
Malkin, M.5
Dean, D.6
-
32
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
Stinson D.R. On some methods for unconditionally secure key distribution and broadcast encryption. Designs, Codes and Cryptology 12 (1997) 215-243
-
(1997)
Designs, Codes and Cryptology
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
33
-
-
0005053804
-
Some new results on key distribution patterns and broadcast encryption
-
Stinson D.R., and van Trung T. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography 14 (2008) 261-279
-
(2008)
Designs, Codes and Cryptography
, vol.14
, pp. 261-279
-
-
Stinson, D.R.1
van Trung, T.2
-
34
-
-
0032178082
-
Secure group communications using key graphs
-
C. Wong, M. Gouda, S. Lam, Secure group communications using key graphs, in: Proceedings of ACM SIGCOMM'98, 1998, pp. 68-79.
-
(1998)
Proceedings of ACM SIGCOMM'98
, pp. 68-79
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
-
35
-
-
0034780938
-
Reliable group re-keying: A performance analysis
-
Y.R. Yang, X.S. Li, X.B. Zhang, S.S. Lam, Reliable group re-keying: a performance analysis, in: ACM SIGCOMM'01, 2001, pp. 27-38.
-
(2001)
ACM SIGCOMM'01
, pp. 27-38
-
-
Yang, Y.R.1
Li, X.S.2
Zhang, X.B.3
Lam, S.S.4
|