-
1
-
-
27544461415
-
KTDCKM-SDC: A distributed conference key management scheme for secure dynamic conferencing
-
Cartagena, Spain, pp
-
Adusumilli, P. and Zou, X. (2005) 'KTDCKM-SDC: A distributed conference key management scheme for secure dynamic conferencing', Proceedings of the Tenth IEEE Symposium ON Computers and Communications (ISCC), Cartagena, Spain, pp.476-481.
-
(2005)
Proceedings of the Tenth IEEE Symposium ON Computers and Communications (ISCC)
, pp. 476-481
-
-
Adusumilli, P.1
Zou, X.2
-
2
-
-
0005944705
-
Interaction in key distribution schemes
-
Advances in Cryptology, CRYPTO'93, Springer, Berlin
-
Beimel, A. and Chor, B. (1994) 'Interaction in key distribution schemes', Advances in Cryptology - CRYPTO'93, LNCS, Springer, Berlin, Vol. 773, pp.444-457.
-
(1994)
LNCS
, vol.773
, pp. 444-457
-
-
Beimel, A.1
Chor, B.2
-
4
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptology, EUROCRYPT'84, Springer, Berlin
-
Blom, R. (1985) 'An optimal class of symmetric key generation systems', Advances in Cryptology - EUROCRYPT'84, LNCS, Springer, Berlin, Vol. 209, pp.335-338.
-
(1985)
LNCS
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
5
-
-
84948984838
-
Space requirements for broadcast encryption
-
Advances in Cryptology, EUROCRYPT'94, Springer, Berlin
-
Blundo, C. and Cresti, A. (1995) 'Space requirements for broadcast encryption', Advances in Cryptology - EUROCRYPT'94, LNCS, Springer, Berlin, Vol. 950, pp.287-298.
-
(1995)
LNCS
, vol.950
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
6
-
-
85028765277
-
Perfect secure key distribution for dynamic conferences
-
Springer, Berlin
-
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U. and Yung, M. (1993) 'Perfect secure key distribution for dynamic conferences', Advances in Cryptology - CRYPTO'92, LNCS, Springer, Berlin, Vol. 740, pp.471-486.
-
(1993)
Advances in Cryptology - CRYPTO'92, LNCS
, vol.740
, pp. 471-486
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
7
-
-
0001720832
-
Generalized Beimel-Chor scheme for broadcast encryption and interactive key distribution
-
Blundo, C., Mattos, L.A.F. and Stinson, D.R. (1998) 'Generalized Beimel-Chor scheme for broadcast encryption and interactive key distribution', Theoretical Computer Science, Vol. 200, Nos. 1-2, pp.313-334.
-
(1998)
Theoretical Computer Science
, vol.200
, Issue.1-2
, pp. 313-334
-
-
Blundo, C.1
Mattos, L.A.F.2
Stinson, D.R.3
-
8
-
-
84948991087
-
A secure and efficient conference key distribution system
-
Springer, Berlin
-
Burmester, M. and Desmedt, Y. (1995) 'A secure and efficient conference key distribution system', Advances in Cryptology - EUROCRYPT'94, LNCS Springer, Berlin, Vol. 950, pp.275-286.
-
(1995)
Advances in Cryptology - EUROCRYPT'94, LNCS
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
9
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Chiou, G.H. and Chen, W.T. (1989) 'Secure broadcasting using the secure lock', IEEE Transactions on Software Engineering, Vol. 15, No. 8, pp.929-934.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.H.1
Chen, W.T.2
-
10
-
-
84890331097
-
Unconditionally secure dynamic conference key distribution
-
Cambridge, MA, USA, pp
-
Desmedt, Y. and Viswanathan, V. (1998) 'Unconditionally secure dynamic conference key distribution', Proceedings of the IEEE International Symposium on Information Theory, Cambridge, MA, USA, pp.383-383.
-
(1998)
Proceedings of the IEEE International Symposium on Information Theory
, pp. 383-383
-
-
Desmedt, Y.1
Viswanathan, V.2
-
11
-
-
0036375297
-
Key trees and the security of interval multicast
-
Gouda, M.G., Huang, C-T. and Elnozahy, E.N. (2002) 'Key trees and the security of interval multicast', Proceedings 22nd International Conference on Distributed Computing Systems, pp.467, 468.
-
(2002)
Proceedings 22nd International Conference on Distributed Computing Systems
-
-
Gouda, M.G.1
Huang, C.-T.2
Elnozahy, E.N.3
-
12
-
-
0004224034
-
-
North Holland Publishing Company, North Holland, Amsterdam
-
Lausch, H. and Nobaur, W. (1973) Algebra of Polynomials, North Holland Publishing Company, North Holland, Amsterdam.
-
(1973)
Algebra of Polynomials
-
-
Lausch, H.1
Nobaur, W.2
-
13
-
-
0003999090
-
-
Cambridge University Press, New York, NY, USA
-
Lidl, R. and Niederreiter, H. (1986) Introduction to Finite Fields and their Applications, Cambridge University Press, New York, NY, USA.
-
(1986)
Introduction to Finite Fields and their Applications
-
-
Lidl, R.1
Niederreiter, H.2
-
14
-
-
4544350950
-
A scalable key distribution scheme for dynamic multicast groups
-
Available at
-
Noubir, G. (1999) 'A scalable key distribution scheme for dynamic multicast groups', The Third European Research Seminar on Advances in Distributed Systems, Available at http://www.ccs.neu.edu/home/noubir/ publications/N99.pdf.
-
(1999)
The Third European Research Seminar on Advances in Distributed Systems
-
-
Noubir, G.1
-
15
-
-
0036353679
-
Key management for simultaneous join/leave in secure multicast
-
Noubir, G., Zhu, F. and Chan, A.H. (2002) 'Key management for simultaneous join/leave in secure multicast', IEEE International Symposium on Information Theory (ISIT), pp.325-330.
-
(2002)
IEEE International Symposium on Information Theory (ISIT)
, pp. 325-330
-
-
Noubir, G.1
Zhu, F.2
Chan, A.H.3
-
16
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979) 'How to share a secret', Communication of ACM, Vol. 22, pp.612-613.
-
(1979)
Communication of ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
0000028420
-
On some methods for unconditionally secure key distribution and broadcast encryption
-
Stinson, D.R. (1997) 'On some methods for unconditionally secure key distribution and broadcast encryption', Design, Codes and Cryptography, Vol. 12, pp.215-243.
-
(1997)
Design, Codes and Cryptography
, vol.12
, pp. 215-243
-
-
Stinson, D.R.1
-
18
-
-
11844292149
-
A dynamic conference scheme extension with efficient burst operation
-
Zou, X., Magliveras, S. and Ramamurthy, B. (2002) 'A dynamic conference scheme extension with efficient burst operation', Congressus Numerantium, Vol. 158, pp.83-92.
-
(2002)
Congressus Numerantium
, vol.158
, pp. 83-92
-
-
Zou, X.1
Magliveras, S.2
Ramamurthy, B.3
-
19
-
-
11844294647
-
Key tree based scalable secure dynamic conferencing schemes
-
MIT Cambridge, MA, USA, 9-11 November, pp
-
Zou, X., Magliveras, S. and Ramamurthy, B. (2004a) 'Key tree based scalable secure dynamic conferencing schemes', Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004), MIT Cambridge, MA, USA, 9-11 November, pp.61-66.
-
(2004)
Proceedings of International Conference on Parallel and Distributed Computing and Systems (PDCS 2004)
, pp. 61-66
-
-
Zou, X.1
Magliveras, S.2
Ramamurthy, B.3
-
20
-
-
84891452488
-
-
Zou, X., Ramamurthy, B. and Magliveras, S.S. (Eds.) (2004b) Secure Group Communications over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X).
-
Zou, X., Ramamurthy, B. and Magliveras, S.S. (Eds.) (2004b) Secure Group Communications over Data Networks, Springer, ISBN: 0-387-22970-1 (The ebook ISBN: 0-387-22971-X).
-
-
-
|