-
1
-
-
0003851729
-
-
9th printing, New York: Dover
-
M. Abramowitz, and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, 9th printing, New York: Dover, p. 10, 1972.
-
(1972)
Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables
, pp. 10
-
-
Abramowitz, M.1
Stegun, I.A.2
-
2
-
-
0033717661
-
Secure group communication in asynchronous networks with failures, Integration and experiments
-
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. N. Rotaru, T. Schlossnagle, J. Schultz, J. Stanton, and G. Tsudik, "Secure group communication in asynchronous networks with failures, Integration and experiments," IEEE International Conference on Distributed Computing Systems, pp. 330-343, 2000.
-
(2000)
IEEE International Conference on Distributed Computing Systems
, pp. 330-343
-
-
Amir, Y.1
Ateniese, G.2
Hasse, D.3
Kim, Y.4
Rotaru, C.N.5
Schlossnagle, T.6
Schultz, J.7
Stanton, J.8
Tsudik, G.9
-
3
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
Apr
-
Y. Amir, Y. Kim, C. N. Rotaru, J. Schultz, and J. Stanton, "Secure group communication using robust contributory key agreement," IEEE Transactions on Parallel and Distributed Systems, vol. 15, no. 4, pp. 468-480, Apr. 2004.
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, vol.15
, Issue.4
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Rotaru, C.N.3
Schultz, J.4
Stanton, J.5
-
4
-
-
4444225744
-
On the performance of group key agreement protocols
-
Y. Amir, Y. Kim, and C. N. Rotaru, "On the performance of group key agreement protocols," ACM Transactions on Information and System Security, vol. 7, no. 3, pp. 457-488, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 457-488
-
-
Amir, Y.1
Kim, Y.2
Rotaru, C.N.3
-
5
-
-
0035751060
-
Provably authenticated group DiffieHellman key exchange
-
Philadelphia, PA
-
E. Bresson, O. Chevassut, D. Pointcheval, amd J. Quisquater, "Provably authenticated group DiffieHellman key exchange," Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255-264, Philadelphia, PA, 2001.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 255-264
-
-
Bresson, E.1
Chevassut, O.2
Pointcheval, D.3
Quisquater, J.4
-
7
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie, and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, IT-vol. 22, no. 6, pp. 644-654. Nov. 1976.
-
(1976)
IEEE Transactions on Information Theory, IT
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
84875352944
-
In PKI Ww Trust?
-
Sep.
-
M. Fratto, "In PKI Ww Trust?," Network Computing, vol.12, no. 18, pp. 69-77, Sep., 2001.
-
(2001)
Network Computing
, vol.12
, Issue.18
, pp. 69-77
-
-
Fratto, M.1
-
9
-
-
84867382186
-
Media access control (MAC) address-based group key authentication scheme
-
Orlando, Florida, USA, July
-
S. Hong, and N. L. Benitez, "Media access control (MAC) address-based group key authentication scheme," The 9th World Multiconference on Systemics, Cybernetics and Informatics, pp. 160-164, Orlando, Florida, USA, July 2005.
-
(2005)
The 9th World Multiconference on Systemics, Cybernetics and Informatics
, pp. 160-164
-
-
Hong, S.1
Benitez, N.L.2
-
10
-
-
84922060684
-
Enhanced Group Key Computation Protocol
-
Las Vegas, USA, June
-
S. Hong, and N. L. Benitez, "Enhanced Group Key Computation Protocol," The 2006 International Conference on Security and Management (SAM'06), Las Vegas, USA, June 26-29, 2006.
-
(2006)
The 2006 International Conference on Security and Management (SAM'06)
, pp. 26-29
-
-
Hong, S.1
Benitez, N.L.2
-
11
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
ACM Press, Athens, Greece, Nov.
-
Y. Kim, A. Perrig, and G. Tsudik, "Simple and fault-tolerant key agreement for dynamic collaborative groups," The 7th ACM Conference on Computer and Communications Security, pp. 235-244, ACM Press, Athens, Greece, Nov. 2000.
-
(2000)
The 7th ACM Conference on Computer and Communications Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
12
-
-
84904254536
-
Communicationefficient group key agreement
-
June
-
Y. Kim, A. Perrig, and G. Tsudik, "Communicationefficient group key agreement," 17th International Information Security Conference (IFIP SEC'01), pp. 229-244, June 2001.
-
(2001)
17th International Information Security Conference (IFIP SEC'01)
, pp. 229-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
13
-
-
4444304364
-
Group Key Agreement: Theory and Practice
-
May
-
Y. Kim, Group Key Agreement: Theory and Practice, Ph.D. thesis, May 2002.
-
(2002)
Ph.D. thesis
-
-
Kim, Y.1
-
14
-
-
3142512728
-
Tree-based group key agreement
-
Y. Kim, A. Perrig, and G. Tsudik, "Tree-based group key agreement," ACM Transactions on Information and System Security, pp. 60-96, 2004.
-
(2004)
ACM Transactions on Information and System Security
, pp. 60-96
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
16
-
-
0028576754
-
Extended virtual synchrony
-
IEEE Computer Society Press, Los Alamitos, CA
-
L. E. Moser, Y. Amir, P. M. M. Smith, and D. A. Agarwal, "Extended virtual synchrony," Proceedings of the IEEE 14th International Conference on Distributed Computing Systems, pp. 56-65, IEEE Computer Society Press, Los Alamitos, CA, 1994.
-
(1994)
Proceedings of the IEEE 14th International Conference on Distributed Computing Systems
, pp. 56-65
-
-
Moser, L.E.1
Amir, Y.2
Smith, P.M.M.3
Agarwal, D.A.4
-
17
-
-
0034247455
-
-
Key agreement in dnamic peer groups, Aug.
-
M. Steiner, G. Tsudik and M. Waidner, "Key agreement in dnamic peer groups," IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 8, pp. 769-780, Aug. 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
19
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Transactions on Networking, vol. 8, no. 1, pp. 16-30, Feb. 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.1
Gouda, M.2
Lam, S.3
|