-
1
-
-
0001293053
-
Broadcast encryption
-
ser. Lecture Notes in Computer Science, D. R. Stinson, Ed. Santa Barbara, CA: Springer-Verlag
-
A. Fiat and M. Naor, "Broadcast encryption", in Advances in Cryptology-Crypto'93, ser. Lecture Notes in Computer Science, D. R. Stinson, Ed. Santa Barbara, CA: Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology-Crypto'93
-
-
Fiat, A.1
Naor, M.2
-
2
-
-
84985921910
-
Collusion-resistant group key management using attribute-based encryption
-
L. Cheung, J. A. Cooley, R. Khazan, and C. Newport, "Collusion- resistant group key management using attribute-based encryption", in Proc. 1st Int. Workshop Group-Oriented Cryptographic Protocols (GOCP), 2007.
-
(2007)
Proc. 1st Int. Workshop Group-oriented Cryptographic Protocols (GOCP)
-
-
Cheung, L.1
Cooley, J.A.2
Khazan, R.3
Newport, C.4
-
3
-
-
0033893174
-
Secure group communications using key graphs
-
DOI 10.1109/90.836475
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs", IEEE/ACM Trans. Netw., vol. 8, no. 1, pp. 16-30, Feb. 2000. (Pubitemid 30584705)
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
4
-
-
0003657439
-
Key management for multicast: Issues and architectures
-
D. M. Wallner, E. J. Harder, and R. C. Agee, "Key management for multicast: Issues and architectures", Internet Draft, Internet Eng. Task Force, 1998.
-
(1998)
Internet Draft, Internet Eng. Task Force
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
5
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
A. T. Sherman and D. A. McGrew, "Key establishment in large dynamic groups using one-way function trees", IEEE Trans. Softw. Eng., vol. 29, no. 5, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Softw. Eng.
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
6
-
-
50149109026
-
Optimal communication complexity of generic multicast key distribution
-
Aug.
-
D. Micciancio and S. Panjwani, "Optimal communication complexity of generic multicast key distribution", IEEE/ACM Trans. Netw., vol. 16, no. 4, pp. 803-813, Aug. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.4
, pp. 803-813
-
-
Micciancio, D.1
Panjwani, S.2
-
7
-
-
0004135561
-
Key management for large dynamic groups: One-way function trees and amortized initialization
-
Aug.
-
D. Balenson, D. McGrew, and A. Sherman, "Key management for large dynamic groups: One-way function trees and amortized initialization", Draft-Irtf-Smug-Groupkeymgmt-Oft-00. Txt, Internet Research Task Force, Aug. 2000.
-
(2000)
Draft-irtf-smug-groupkeymgmt-oft-00.Txt, Internet Research Task Force
-
-
Balenson, D.1
McGrew, D.2
Sherman, A.3
-
8
-
-
0036590079
-
Cryptanalysis of a key management scheme for secure multicast communications
-
G. Horng, "Cryptanalysis of a key management scheme for secure multicast communications", IEICE Trans. Commun., vol. E85-B, no. 5, pp. 1050-1051, 2002.
-
(2002)
IEICE Trans. Commun.
, vol.E85-B
, Issue.5
, pp. 1050-1051
-
-
Horng, G.1
-
9
-
-
84943248325
-
An improved key management scheme for large dynamic groups using one-way function trees
-
W. C. Ku and S. M. Chen, "An improved key management scheme for large dynamic groups using one-way function trees", in Proc. Int. Conf. Parallel Processing Workshops, 2003, pp. 391-396.
-
(2003)
Proc. Int. Conf. Parallel Processing Workshops
, pp. 391-396
-
-
Ku, W.C.1
Chen, S.M.2
-
10
-
-
38049052454
-
Preventing collusion attacks on the one-way function tree (OFT) scheme
-
Zhuhai, China
-
X. Xu, L. Wang, A. Youssef, and B. Zhu, "Preventing collusion attacks on the One-Way Function Tree (OFT) scheme", in Proc. 5th Int. Conf. Applied Cryptography and Network Security, Zhuhai, China, 2007, pp. 177-193.
-
(2007)
Proc. 5th Int. Conf. Applied Cryptography and Network Security
, pp. 177-193
-
-
Xu, X.1
Wang, L.2
Youssef, A.3
Zhu, B.4
-
12
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
13
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor, M. Naor, and J. B. Lotspiech, "Revocation and tracing schemes for stateless receivers", in Proc. Advances in Cryptology- CRYPTO'2001, New York, 2001, pp. 41-62, Lecture Notes in Computer Science. (Pubitemid 33317907)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
14
-
-
84880171922
-
Private group communication: Two perspectives and a unifying solution
-
Dept., Univ. California. San Diego, CA
-
S. Panjwani, Private Group Communication: Two Perspectives and a Unifying Solution, Comput. Sci. Eng. Dept., Univ. California. San Diego, CA, 2007.
-
(2007)
Comput. Sci. Eng.
-
-
Panjwani, S.1
-
15
-
-
84942438500
-
Batch rekeying for secure group communications
-
Hong Kong
-
X. S. Li, Y. R. Yang, M. G. Gouda, and S. S. Lam, "Batch rekeying for secure group communications", in Proc. 10th Int. Conf. World Wide Web, Hong Kong, 2001, pp. 525-534.
-
(2001)
Proc. 10th Int. Conf. World Wide Web
, pp. 525-534
-
-
Li, X.S.1
Yang, Y.R.2
Gouda, M.G.3
Lam, S.S.4
-
16
-
-
84957623200
-
Efficient communication-storage tradeoffs for multicast encryption
-
J. Stern, Ed., Lecture Notes in Computer Science
-
R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption", in Proc. Advances in Cryptology-Eurocrypt'99, J. Stern, Ed., 1999, pp. 459-474, Lecture Notes in Computer Science.
-
(1999)
Proc. Advances in Cryptology-Eurocrypt'99
, pp. 459-474
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
17
-
-
0003455038
-
-
Information Systems Laboratory, Stanford Univ., Palo Alto, CA, Tech. Rep. No. 1979-1
-
R. C. Merkle, Secrecy, Authentication, and Public-Key Cryptosystems, Information Systems Laboratory, Stanford Univ., Palo Alto, CA, Tech. Rep. No. 1979-1, 1979.
-
(1979)
Secrecy, Authentication, and Public-key Cryptosystems
-
-
Merkle, R.C.1
-
18
-
-
84957656774
-
MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences
-
B. Briscoe, "MARKS: Zero side effect multicast key management using arbitrarily revealed key sequences", in Proc. Networked Group Communication 1999, pp. 301-320.
-
(1999)
Proc. Networked Group Communication
, pp. 301-320
-
-
Briscoe, B.1
-
19
-
-
0032627571
-
Key management for secure lnternet multicast using boolean function minimization techniques
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and D. Saha, "Key management for secure lnternet multicast using boolean function minimization techniques", in Proc. IEEE 18th Annu. Joint Conf. IEEE Computer and Communications Societies (INFOCOM'99), 1999, vol. 2, pp. 689-698.
-
(1999)
Proc. IEEE 18th Annu. Joint Conf. IEEE Computer and Communications Societies (INFOCOM'99)
, vol.2
, pp. 689-698
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
20
-
-
84948668912
-
HySOR: Group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers
-
J. Fan, P. Judge, and M. H. Ammar, "HySOR: Group key management with collusion-scalability tradeoffs using a hybrid structuring of receivers", in Proc. 11th Int. Conf. Computer Communications and Networks, 2002, pp. 196-201.
-
(2002)
Proc. 11th Int. Conf. Computer Communications and Networks
, pp. 196-201
-
-
Fan, J.1
Judge, P.2
Ammar, M.H.3
-
21
-
-
38049040237
-
Tackling adaptive corruptions in multicast encryption protocols
-
Amsterdam, The Netherlands
-
S. Panjwani, "Tackling adaptive corruptions in multicast encryption protocols", in Proc. 4th Conf. Theory of Cryptography, Amsterdam, The Netherlands, 2007, pp. 21-40.
-
(2007)
Proc. 4th Conf. Theory of Cryptography
, pp. 21-40
-
-
Panjwani, S.1
|