-
1
-
-
79955534570
-
Preventing pollution attacks in multi-source network coding
-
S. Agrawal, D. Boneh, X. Boyen, and D. Mandell-Freeman. Preventing pollution attacks in multi-source network coding. Cryptology ePrint Archive, Report 2010/183, 2010. http://eprint.iacr.org/.
-
(2010)
Cryptology EPrint Archive, Report 2010/183
-
-
Agrawal, S.1
Boneh, D.2
Boyen, X.3
Mandell-Freeman, D.4
-
2
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
M.J. Atallah, M. Blanton, N. Fazio, and K.B. Frikken. Dynamic and efficient key management for access hierarchies. ACM Transactions on Information and System Security, 12(3):1-43, 2009.
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
, pp. 1-43
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
3
-
-
34748839039
-
Efficient techniques for realizing geo-spatial access control
-
DOI 10.1145/1229285.1229301, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
M.J. Atallah, M. Blanton, and K.B. Frikken. Efficient techniques for realizing geo-spatial access control. In 2nd ACM Symposium on Information, Computer and Communications Security, pages 82-92, 2007. (Pubitemid 47479230)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 82-92
-
-
Atallah, M.J.1
Blanton, M.2
Frikken, K.B.3
-
4
-
-
34547282859
-
Provably-secure time-bound hierarchical key assignment schemes
-
DOI 10.1145/1180405.1180441, 1180441, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
G. Ateniese, A. De Santis, A.L. Ferrara, and B. Masucci. Provably-secure time-bound hierarchical key assignment schemes. In 13th ACM Conference on Computer and Communications Security, pages 288-297, 2006. (Pubitemid 47131377)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 288-297
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
5
-
-
84957360970
-
Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees
-
Advances in Cryptology - Eurocrypt '97
-
N. Baric and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology-Eurocrypt '97, pages 480-494, 1997. (Pubitemid 127067821)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
6
-
-
20544455127
-
Transitive signatures: New schemes and proofs
-
DOI 10.1109/TIT.2005.847697
-
M. Bellare and Neven G. Transitive signatures: new schemes and proofs. IEEE Transactions on Information Theory, 51(6):2133-2151, 2005. (Pubitemid 40843631)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.6
, pp. 2133-2151
-
-
Bellare, M.1
Neven, G.2
-
7
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B.H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
8
-
-
67049095592
-
Signing a linear subspace: Signature schemes for network coding
-
D. Boneh, D. Freeman, J. Katz, and B. Waters. Signing a linear subspace: Signature schemes for network coding. In 12th International Conference on Practice and Theory in Public Key Cryptography, pages 68-87, 2009.
-
(2009)
12th International Conference on Practice and Theory in Public Key Cryptography
, pp. 68-87
-
-
Boneh, D.1
Freeman, D.2
Katz, J.3
Waters, B.4
-
9
-
-
7244254658
-
Informed content delivery across adaptive overlay networks
-
J.W. Byers, J. Considine, M. Mitzenmacher, and S. Rost. Informed content delivery across adaptive overlay networks. IEEE/ACM Transactions on Networking, 12(5):767-780, 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.5
, pp. 767-780
-
-
Byers, J.W.1
Considine, J.2
Mitzenmacher, M.3
Rost, S.4
-
10
-
-
3543102859
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
volume 2442 of Lecture Notes in Computer Science
-
J. Camenisch and A. Lysyanskaya. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 101-120, 2002.
-
(2002)
Advances in Cryptology - CRYPTO 2002
, pp. 101-120
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
11
-
-
84921060028
-
Separability and efficiency for generic group signature schemes
-
J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes. In Advances in Cryptology-Crypto '99, volume 1666, pages 413-430, 1999.
-
(1999)
Advances in Cryptology-Crypto '99
, vol.1666
, pp. 413-430
-
-
Camenisch, J.1
Michels, M.2
-
15
-
-
84945127249
-
Practical Threshold RSA Signatures without a Trusted Dealer
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
I. Damgård and M. Koprowski. Practical threshold RSA signatures without a trusted dealer. In Advances in Cryptology - Eurocrypt '01, pages 152-165, 2001. (Pubitemid 33275830)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 152-165
-
-
Damgard, I.1
Koprowski, M.2
-
18
-
-
2442583610
-
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
-
C. Estan and G. Varghese. New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice. ACM Transactions on Computer Systems, 21(3):270-313, 2003.
-
(2003)
ACM Transactions on Computer Systems
, vol.21
, Issue.3
, pp. 270-313
-
-
Estan, C.1
Varghese., G.2
-
19
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A.Z. Broder. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking, 8(3):281-293, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
20
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
volume 263 of LNCS
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology|Crypto '86, volume 263 of LNCS, pages 186-194, 1986.
-
(1986)
Advances in Cryptology|Crypto '86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
22
-
-
85041369155
-
Secure network coding over the integers
-
R. Gennaro, J. Katz, H. Krawczyk, and T. Rabin. Secure network coding over the integers. Cryptology ePrint Archive, Report 2009/569, 2010. http://eprint.iacr.org/.
-
(2010)
Cryptology EPrint Archive, Report 2009/569
-
-
Gennaro, R.1
Katz, J.2
Krawczyk, H.3
Rabin, T.4
-
23
-
-
84958749510
-
The provable security of graph-based one-time signatures and extensions to algebraic signature schemes
-
A. Hevia and D. Micciancio. The provable security of graph-based one-time signatures and extensions to algebraic signature schemes. In Advances in Cryptology-Asiacrypt '02, pages 379-396, 2002.
-
(2002)
Advances in Cryptology-Asiacrypt '02
, pp. 379-396
-
-
Hevia, A.1
Micciancio, D.2
-
24
-
-
0036498835
-
An architecture for secure wide-area service discovery
-
DOI 10.1023/A:1013772027164, Selected Paper from MobiCom 99
-
T.D. Hodes, S.E. Czerwinski, B.Y. Zhao, A.D. Joseph, and R.H. Katz. An architecture for secure wide-area service discovery. Wireless Networks, 8(2/3):213-230, 2002. (Pubitemid 34168128)
-
(2002)
Wireless Networks
, vol.8
, Issue.2-3
, pp. 213-230
-
-
Hodes, T.D.1
Czerwinski, S.E.2
Zhao, B.Y.3
Joseph, A.D.4
Katz, R.H.5
-
26
-
-
84944905011
-
Homomorphic signature schemes
-
R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. In The Cryptographer's Track at the RSA Conference on Topics in Cryptology, pages 244-262, 2002.
-
(2002)
The Cryptographer's Track at the RSA Conference on Topics in Cryptology
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
27
-
-
29244453439
-
Group signatures: Provable security, efficient constructions and anonymity from trapdoor-holders
-
A. Kiayias and M. Yung. Group signatures: provable security, efficient constructions and anonymity from trapdoor-holders. Cryptology ePrint Archive, Report 2004/076, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology EPrint Archive, Report 2004/076
-
-
Kiayias, A.1
Yung, M.2
-
28
-
-
84863121548
-
Append-only signatures
-
E. Kiltz, A. Mityagin, S. Panjwani, and B. Raghavan. Append-only signatures. In 32th International Colloquium on Automata, Languages and Programming, 2005.
-
(2005)
32th International Colloquium on Automata, Languages and Programming
-
-
Kiltz, E.1
Mityagin, A.2
Panjwani, S.3
Raghavan, B.4
-
29
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
31
-
-
84976743475
-
Tolerating failures of continuous-valued sensors
-
K. Marzullo. Tolerating failures of continuous-valued sensors. ACM Transactions on Computer Systems, 8(4):284-304, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.4
, pp. 284-304
-
-
Marzullo, K.1
-
33
-
-
42149108421
-
A simple transitive signature scheme for directed trees
-
G. Neven. A simple transitive signature scheme for directed trees. Theoretical Computer Science, 396(1-3):277-282, 2008.
-
(2008)
Theoretical Computer Science
, vol.396
, Issue.1-3
, pp. 277-282
-
-
Neven, G.1
-
37
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
41
-
-
85175131664
-
Bounded vector signatures and their applications
-
University of North Carolina at Chapel Hill, December
-
L. Wei, S. E. Coull, and M. K. Reiter. Bounded vector signatures and their applications. Technical Report 10-018, Department of Computer Science, University of North Carolina at Chapel Hill, December 2010.
-
(2010)
Technical Report 10-018, Department of Computer Science
-
-
Wei, L.1
Coull, S.E.2
Reiter, M.K.3
-
42
-
-
0033893174
-
Secure group communications using key graphs
-
DOI 10.1109/90.836475
-
C. K. Wong, M. Gouda, and S. S. Lam. Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8(1):16-30, 2000. (Pubitemid 30584705)
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
|