-
1
-
-
0032218239
-
Communication complexity of group key distribution
-
New York, NY
-
K. Becker and U. Wille, "Communication complexity of group key distribution," Proceedings ACM Conference Computer and Commununications Security, pp. 1-6, New York, NY, 1998.
-
(1998)
Proceedings ACM Conference Computer and Commununications Security
, pp. 1-6
-
-
Becker, K.1
Wille, U.2
-
2
-
-
66549088524
-
Multicast security: A taxanomy and some efficient constructions
-
Mar
-
R. Canatti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pankus, "Multicast security: A taxanomy and some efficient constructions," IEEE Network, vol. 2, pp. 122-128, Mar. 1999.
-
(1999)
IEEE Network
, vol.2
, pp. 122-128
-
-
Canatti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pankus, B.6
-
3
-
-
0242414397
-
Key management approaches to offer data confidentiality for securemulticast
-
K. C. Chan and S. H. G. Chan, "Key management approaches to offer data confidentiality for secure multicast," IEEE Network, vol. 17, no. 5, pp. 31-39, Oct. 2003.
-
(2003)
IEEE Network
, vol.17
, Issue.5
, pp. 31-39
-
-
Chan, K.C.1
Chan, S.H.G.2
-
4
-
-
84875311681
-
On the security cost of interval multicast
-
W. Chen, Y. Sun, and A. S. Pyzdrowski, "On the security cost of interval multicast," International Journal of Network Security, vol. 10, no. 3, pp. 204-212, 2010.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 204-212
-
-
Chen, W.1
Sun, Y.2
Pyzdrowski, A.S.3
-
5
-
-
80054073044
-
Scalable delay-constrained multicast group key management
-
S. Gharout, Y. Challal, and A. Bouabdallah, "Scalable delay-constrained multicast group key management," International Journal of Network Security, vol. 7, no. 2, pp. 160-174, 2008.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 160-174
-
-
Gharout, S.1
Challal, Y.2
Bouabdallah, A.3
-
6
-
-
0037250819
-
Security issues and solutions in multicast content distribution: A survey
-
Feb
-
P. Judge and M. Ammar, "Security issues and solutions in multicast content distribution: A survey,"IEEE Network, vol. 17, pp. 30-36, Feb. 2003.
-
(2003)
IEEE Network
, vol.17
, pp. 30-36
-
-
Judge, P.1
Ammar, M.2
-
8
-
-
0036505660
-
Design of secure multicast key management scheme with communication budget constraint
-
Mar
-
M. Li, R. Poovendran, and C. Bernstein, "Design ofsecure multicast key management scheme with communication budget constraint," IEEE Communications Letters, vol. 6, no. 3, pp. 108-110, Mar. 2002.
-
(2002)
IEEE Communications Letters
, vol.6
, Issue.3
, pp. 108-110
-
-
Li, M.1
Poovendran, R.2
Bernstein, C.3
-
9
-
-
0033356116
-
A survey of security issues in multicast communications
-
Mar
-
M. Moyer, J. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network Magazine, vol. 13, no. 6, pp. 12-23, Mar. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, pp. 12-23
-
-
Moyer, M.1
Rao, J.2
Rohatgi, P.3
-
10
-
-
84858224247
-
A new secure multicast key distribution protocol using combinatorial boolean approach
-
M. M. N. Rasslan, Y. H. Dakroury, and H. K. Aslan,"A new secure multicast key distribution protocol using combinatorial boolean approach," International Journal of Network Security, vol. 8, no. 1, pp. 75-89,2009.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.1
, pp. 75-89
-
-
Rasslan, M.M.N.1
Dakroury, Y.H.2
Aslan, H.K.3
-
11
-
-
0029720059
-
Diffie Hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie Hellman key distribution extended to group communication," ACM Computer and Communications Security, pp. 31-37, 1996.
-
(1996)
ACM Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
12
-
-
0003978251
-
Key Management for Multicast: Issues and Architecture
-
RFC 2627, June
-
D. M. Wallner, E. J. Harder, and R. C. Agee, Key Management for Multicast: Issues and Architecture, RFC 2627, June 1999.
-
(1999)
-
-
Wallner, D.M.1
Harder, E.J.2
Agee, R.C.3
-
13
-
-
40049083567
-
Effcient key agreement for large and dynamic multicast groups
-
L. Wang and C. K. Wu, "Effcient key agreement for large and dynamic multicast groups," International Journal of Network Security, vol. 3, no. 1, pp. 8-17,2006.
-
(2006)
InternationalJournal of Network Security
, vol.3
, Issue.1
, pp. 8-17
-
-
Wang, L.1
Wu, C.K.2
-
14
-
-
66549115448
-
-
ICON'03
-
J. Zhang, V. Varadharajan, and Y. Mu, "A novel dynamic key management scheme for secure multicasting," ICON'03, pp. 391-395, 2003
-
(2003)
A novel dynamic key management scheme for secure multicasting
, pp. 391-395
-
-
Zhang, J.1
Varadharajan, V.2
Mu, Y.3
-
15
-
-
80054085558
-
A peer-based recovery scheme for group rekeying in secure multicast
-
Q. Zhang and K. L. Calvert, "A peer-based recovery scheme for group rekeying in secure multicast," International Journal of Networ Security, vol. 6, no.1, pp. 15-25, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.1
, pp. 15-25
-
-
Zhang, Q.1
Calvert, K.L.2
|