-
1
-
-
13944258256
-
A quick group key distribution scheme with entity revocation
-
LNCS 1716, Springer, Berlin
-
Anzai, J., Matsuzaki, N., Matsumoto, T.: A quick group key distribution scheme with entity revocation. Adv. in Cryptology-Asiacrypt'99. LNCS 1716, pp. 333-347. Springer, Berlin (1999).
-
(1999)
Adv. in Cryptology-Asiacrypt'99
, pp. 333-347
-
-
Anzai, J.1
Matsuzaki, N.2
Matsumoto, T.3
-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
Blakley G. R.: Safeguarding cryptographic keys. AFIPS Conference Proceedings 48, 313-317 (1979).
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
4
-
-
84957085257
-
An efficient public key traitor tracing scheme
-
Springer- LNCS 1666, and a full version available at
-
Boneh, D., Franklin, M.: An efficient public key traitor tracing scheme. In: Adv. in Cryptology-Crypto '99, Springer- LNCS 1666 (1999), pp. 338-353, and a full version available at http://crypto. stanford. edu/~dabo/pubs. html.
-
(1999)
Adv. in Cryptology-Crypto '99
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York, NY, March
-
Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: a taxonomy and some efficient constructions. In: Proceedings of INFOCOM '99, vol. 2, pp. 708-716. New York, NY, March (1999).
-
(1999)
Proceedings of INFOCOM '99
, vol.2
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
7
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
LNCS 1592, Springer, Berlin
-
Canetti, R., Malkin, T., Nissim, K.: Efficient communication-storage tradeoffs for multicast encryption. In: Proceedings of Advances in Cryptology-Eurocrypt '99. LNCS 1592, pp. 459-474. Springer, Berlin (1999).
-
(1999)
Proceedings of Advances in Cryptology-Eurocrypt '99
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
8
-
-
84985922619
-
Tracing traitors
-
LNCS Springer, Berlin
-
Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Proceedings of Advances in Cryptology-Crypto '94. LNCS vol. 839, pp. 257-270. Springer, Berlin (1994).
-
(1994)
Proceedings of Advances in Cryptology-Crypto '94
, vol.839
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
9
-
-
0034188648
-
Tracing traitors
-
Chor B., Fiat A., Naor M., Pinkas B.: Tracing traitors. IEEE Trans. Inf. Theor. 46(3), 893-910 (2000).
-
(2000)
IEEE Trans. Inf. Theor.
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
10
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptove chosen ciphertext attacks
-
LNCS 1462, Springer, Berlin
-
Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptove chosen ciphertext attacks. In: Proceedings of Advances in Cryptology-Crypto '98. LNCS 1462, pp. 13-25. Springer, Berlin (1998).
-
(1998)
Proceedings of Advances in Cryptology-Crypto '98
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
12
-
-
84947937393
-
A secure, robust watermark for multimedia
-
Cambridge, UK. LNCS 1174, Springer, Berlin
-
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. Information Hiding Workshop, Cambridge, UK. LNCS 1174, pp. 185-206. Springer, Berlin (1996).
-
(1996)
Information Hiding Workshop
, pp. 185-206
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
14
-
-
0029720071
-
Digital signets: Self-enforcing protection of digital information
-
In: 28th
-
Dwork, C., Lotspiech, J., Naor, M.: Digital signets: self-enforcing protection of digital information. In: 28th Symposium on the Theory of Computation, pp. 489-498 (1996).
-
(1996)
Symposium on the Theory of Computation
, pp. 489-498
-
-
Dwork, C.1
Lotspiech, J.2
Naor, M.3
-
15
-
-
85032883059
-
A public key cryptosystem a signature scheme based on discrete logarithms
-
LNCS 196, Springer, Berlin
-
ElGamal, T.: A public key cryptosystem a signature scheme based on discrete logarithms. In: Proceedings of Advances in Cryptology-Crypto '84. LNCS 196, pp. 10-18. Springer, Berlin (1985).
-
(1985)
Proceedings of Advances in Cryptology-Crypto '84
, pp. 10-18
-
-
ElGamal, T.1
-
17
-
-
84979291225
-
Broadcast encryption
-
LNCS 773, Springer, Berlin
-
Fiat, A., Naor, M.: Broadcast encryption. Advances in Cryptology-CRYPTO '93. LNCS 773, pp. 480-491. Springer, Berlin (1994).
-
(1994)
Advances in Cryptology-CRYPTO '93
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
18
-
-
84957067564
-
Efficient methods for integrating traceability and broadcast encryption
-
LNCS 1666 Springer, Berlin
-
Gafni, E., Staddon, J., Yin, Y. L.: Efficient methods for integrating traceability and broadcast encryption. In: Proceedings of Advances in Cryptology-Crypto '99. LNCS 1666, pp. 372-387. Springer, Berlin (1999).
-
(1999)
Proceedings of Advances in Cryptology-Crypto '99
, pp. 372-387
-
-
Gafni, E.1
Staddon, J.2
Yin, Y.L.3
-
20
-
-
84880901368
-
Self protecting pirates and black-box traitor tracing
-
LNCS 2139, Springer, Berlin
-
Kiayias, A., Yung, M.: Self protecting pirates and black-box traitor tracing. In: Adv. in Cryptology-Crypto '2001. LNCS 2139, pp. 63-79. Springer, Berlin (2001).
-
(2001)
Adv. in Cryptology-Crypto '2001
, pp. 63-79
-
-
Kiayias, A.1
Yung, M.2
-
21
-
-
84957057937
-
Coding constructions for blacklisting problems without computational assumptions
-
LNCS 1666 Springer, Berlin
-
Kumar, R., Rajagopalan, S., Sahai, A.: Coding constructions for blacklisting problems without computational assumptions. Adv. in Cryptology-Crypto '99. LNCS 1666, pp. 609-623. Springer, Berlin (1999).
-
(1999)
Adv. in Cryptology-Crypto '99
, pp. 609-623
-
-
Kumar, R.1
Rajagopalan, S.2
Sahai, A.3
-
22
-
-
35248866858
-
Optimum traitor tracing and asymmetric schemes
-
LNCS 1403 Springer, Berlin
-
Kurosawa, K., Desmedt, Y.: Optimum traitor tracing and asymmetric schemes. In: Advances in Cryptology-Eurocrypt '98. LNCS 1403, pp. 145-157. Springer, Berlin (1998).
-
(1998)
Advances in Cryptology-Eurocrypt '98
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
26
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
LNCS 2139, Springer, Berlin
-
Naor, D., Naor, M., Lotspiech, J. B.: Revocation and tracing schemes for stateless receivers. In: Proceedings of Advances in Cryptology-Crypto '01. LNCS 2139, pp. 41-62. Springer, Berlin (2001).
-
(2001)
Proceedings of Advances in Cryptology-Crypto '01
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.B.3
-
27
-
-
84957617696
-
Threshold traitor tracing
-
LNCS 1462, Springer, Berlin
-
Naor, M., Pinkas, B.: Threshold traitor tracing. In: Proceedings of Advances in Cryptology-Crypto '98. LNCS 1462, pp. 502-517. Springer, Berlin (1998).
-
(1998)
Proceedings of Advances in Cryptology-Crypto '98
, pp. 502-517
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
0018545449
-
How to share a secret
-
Shamir A.: How to share a secret. Comm. ACM 22(11), 612-613 (1979).
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
31
-
-
85027163232
-
-
SAC'98. LNCS 1556, Springer, Berlin
-
Stinson, D. R., Wei, R.: Key preassigned traceability schemes for broadcast encryption, SAC'98. LNCS 1556, Springer, Berlin (1998).
-
(1998)
Key preassigned traceability schemes for broadcast encryption
-
-
Stinson, D.R.1
Wei, R.2
-
32
-
-
0002016098
-
Combinatorial properties and constructions of traceability schemes and frameproof codes
-
Stinson D. R., Wei R.: Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM J Discret. Math. 11(1), 41-53 (1998).
-
(1998)
SIAM J Discret. Math.
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.R.1
Wei, R.2
-
33
-
-
0003259063
-
Key Management for Multicast: Issues and Architectures
-
June, Available
-
Wallner, D. M., Harder, E. J., Agee, R. C.: Key Management for Multicast: Issues and Architectures, Internet Request for Comments 2627, June, 1999. Available: ftp. ietf. org/rfc/rfc2627. txt.
-
(1999)
Internet Request for Comments 2627
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
35
-
-
0032178082
-
Secure Group Communications Using Key Graphs
-
Sept. 2-4, Vancouver, Canada
-
Wong, C. K., Gouda, M., Lam, S.: Secure Group Communications Using Key Graphs. In: Proceeding of ACM Sigcomm '98, Sept. 2-4, pp. 68-79. Vancouver, Canada.
-
Proceeding of ACM Sigcomm '98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
|