-
1
-
-
0345565893
-
A survey of key management for secure group communication
-
S. Rafaeli and D. Hutchison, "A survey of key management for secure group communication," ACM Computing Surveys, vol. 35, no. 3, pp. 309-329, 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
2
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, and S. S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
-
3
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees," IEEE Transactions on Software Engineering, vol. 29, no. 5, pp. 444-458, 2003.
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
4
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger, "Improved proxy re-encryption schemes with applications to secure distributed storage," ACM Transactions on Information and System Security (TISSEC), vol. 9, no. 1, pp. 1-30, 2006.
-
(2006)
ACM Transactions on Information and System Security (TISSEC)
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
5
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. A. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, "Multicast security: A taxonomy and some efficient constructions," in Proceedings of IEEE International Conference on Computer Communications (INFOCOM), 1999, pp. 708-716.
-
(1999)
Proceedings of IEEE International Conference on Computer Communications (INFOCOM)
, pp. 708-716
-
-
Canetti, R.1
Garay, J.A.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
33646735175
-
Secure multicast using proxy encryption
-
Y.-P. Chiu, C.-L. Lei, and C.-Y. Huang, "Secure multicast using proxy encryption," in Proceedings of International Conference on Information and Communications Security (ICICS), 2005, pp. 280-290.
-
(2005)
Proceedings of International Conference on Information and Communications Security (ICICS)
, pp. 280-290
-
-
Chiu, Y.-P.1
Lei, C.-L.2
Huang, C.-Y.3
-
7
-
-
79960889299
-
Proxy encryption based secure multicast in wireless mesh networks
-
Y. Han, X. Gui, X. Wu, and X. Yang, "Proxy encryption based secure multicast in wireless mesh networks," Journal of Network and Computer Applications, 2010.
-
(2010)
Journal of Network and Computer Applications
-
-
Han, Y.1
Gui, X.2
Wu, X.3
Yang, X.4
-
8
-
-
34247877631
-
Secure multicast in dynamic environments
-
C.-Y. Huang, Y.-P. Chiu, K.-T. Chen, and C.-L. Lei, "Secure multicast in dynamic environments," Computer Networks, vol. 51, no. 10, pp. 2805-2817, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.10
, pp. 2805-2817
-
-
Huang, C.-Y.1
Chiu, Y.-P.2
Chen, K.-T.3
Lei, C.-L.4
-
9
-
-
42149154467
-
Decentralized group key management for dynamic networks using proxy cryptography
-
J. Hur, Y. joo Shin, and H. Yoon, "Decentralized group key management for dynamic networks using proxy cryptography," in Proceedings of ACM workshop on QoS and security for wireless and mobile networks, 2007, pp. 123-129.
-
(2007)
Proceedings of ACM Workshop on QoS and Security for Wireless and Mobile Networks
, pp. 123-129
-
-
Hur, J.1
Joo Shin, Y.2
Yoon, H.3
-
10
-
-
0034838199
-
Elk, a new protocol for efficient large-group key distribution
-
A. Perrig, D. X. Song, and J. D. Tygar, "Elk, a new protocol for efficient large-group key distribution," in Proceedings of IEEE Symposium on Security and Privacy, 2001, pp. 247-262.
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 247-262
-
-
Perrig, A.1
Song, D.X.2
Tygar, J.D.3
-
11
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM), 1997, pp. 277-288.
-
(1997)
Proceedings of ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM)
, pp. 277-288
-
-
Mittra, S.1
-
12
-
-
34250309913
-
Scalable solutions for secure group communications
-
R. Mukherjee and J. W. Atwood, "Scalable solutions for secure group communications," Computer Networks, vol. 51, no. 12, pp. 3525-3548, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3525-3548
-
-
Mukherjee, R.1
Atwood, J.W.2
-
13
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
M. Mambo and E. Okamoto, "Proxy cryptosystems: Delegation of the power to decrypt ciphertexts," in Proceedings of IEICE transactions on fundamentals of electronics, communications and computer sciences, vol. E80-A, no. 1, 1997, pp. 1-25.
-
(1997)
Proceedings of IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E80-A
, Issue.1
, pp. 1-25
-
-
Mambo, M.1
Okamoto, E.2
-
15
-
-
84942438500
-
Batch rekeying for secure group communications
-
X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch rekeying for secure group communications," in Proceedings of International World Wide Web Conference (WWW), 2001, pp. 525-534.
-
(2001)
Proceedings of International World Wide Web Conference (WWW)
, pp. 525-534
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
16
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography," in Proceedings of EUROCRYPT, 1998, pp. 127- 144.
-
(1998)
Proceedings of EUROCRYPT
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
20
-
-
77957655174
-
Cca proxy re-encryption without bilinear maps in the standard model
-
T. Matsuda, R. Nishimaki, and K. Tanaka, "Cca proxy re-encryption without bilinear maps in the standard model," in Public Key Cryptography (PKC), 2010, pp. 261-278.
-
(2010)
Public Key Cryptography (PKC)
, pp. 261-278
-
-
Matsuda, T.1
Nishimaki, R.2
Tanaka, K.3
-
22
-
-
79960856522
-
-
N. I. o. S. U.S. Department of Commerce and Technology. [Online]
-
N. I. o. S. U.S. Department of Commerce and Technology, 2008. [Online]. Available: http://csrc.nist.gov/publications/fips/fips180-3/fips180-3final.pdf
-
(2008)
-
-
-
23
-
-
37549056155
-
Hierarchical group access control for secure multicast communications
-
Y. Sun and K. J. R. Liu, "Hierarchical group access control for secure multicast communications," IEEE/ACM Transactions on Networking, vol. 15, no. 6, pp. 1514-1526, 2007.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.6
, pp. 1514-1526
-
-
Sun, Y.1
Liu, K.J.R.2
-
24
-
-
33646870054
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
D. Boneh, C. Gentry, and B. Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys," in Proceedings of CRYPTO, 2005, pp. 258-275.
-
(2005)
Proceedings of CRYPTO
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
26
-
-
40249098618
-
Public key broadcast encryption with low number of keys and constant decryption time
-
Y.-R. Liu and W.-G. Tzeng, "Public key broadcast encryption with low number of keys and constant decryption time," in Proceedings of Public Key Cryptography (PKC), 2008, pp. 380-396.
-
(2008)
Proceedings of Public Key Cryptography (PKC)
, pp. 380-396
-
-
Liu, Y.-R.1
Tzeng, W.-G.2
|