-
1
-
-
57049153498
-
Strongly-resilient and non-interactive hierarchical key-agreement in MANETs
-
Berlin: Springer
-
Gennaro, R.; Halevi, S.; Krawczyk, H.; Rabin, T.; Reidt, S. & Wolthusen, S. D. (2008). Strongly-resilient and non-interactive hierarchical key-agreement in MANETs. In Proceedings of the 13th European symposium on research in computer security, ESORICS' 08, LNCS 5283 (pp. 49-65). Berlin: Springer.
-
(2008)
Proceedings of the 13th European Symposium on Research in Computer Security, ESORICS' 08, LNCS 5283
, pp. 49-65
-
-
Gennaro, R.1
Halevi, S.2
Krawczyk, H.3
Rabin, T.4
Reidt, S.5
Wolthusen, S.D.6
-
2
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Berlin: Springer
-
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology-CRYPTO'84, LNCS 196 (pp. 47-53). Berlin: Springer.
-
(1984)
Advances in cryptology-CRYPTO'84, LNCS 196
, pp. 47-53
-
-
Shamir, A.1
-
3
-
-
0005908666
-
Perfectly secure key distribution for dynamic conferences
-
10.1006/inco.1998.2717 0921.68129 1642243
-
Blundo, C.; Santis, A. D.; Herzberg, A.; Kutten, S.; Vaccaro, U.; & Yung, M. (1998). Perfectly secure key distribution for dynamic conferences. Information and Computation, 146, 1-23.
-
(1998)
Information and Computation
, vol.146
, pp. 1-23
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
4
-
-
79251598847
-
An efficient and non-interactive hierarchical key agreement protocol
-
10.1016/j.cose.2010.10.003
-
Guo, H.; Mu, Y.; Li, Z.; & Zhang, X. (2011). An efficient and non-interactive hierarchical key agreement protocol. Computers & Security, 30, 28-34.
-
(2011)
Computers & Security
, vol.30
, pp. 28-34
-
-
Guo, H.1
Mu, Y.2
Li, Z.3
Zhang, X.4
-
5
-
-
84947242701
-
Towards hierarchical identity-based encryption
-
Berlin: Springer
-
Horwitz, J.; & Lynn, B. (2002). Towards hierarchical identity-based encryption. In EUROCRYPT 2002, LNCS 2332 (pp. 466-481). Berlin: Springer.
-
(2002)
Eurocrypt 2002, LNCS 2332
, pp. 466-481
-
-
Horwitz, J.1
Lynn, B.2
-
6
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Berlin: Springer
-
Blom, R. (1984). An optimal class of symmetric key generation systems. In Advances in cryptology-EUROCRYPT'84. LNCS 209 (pp. 335-338). Berlin: Springer.
-
(1984)
Advances in cryptology-EUROCRYPT'84. LNCS 209
, pp. 335-338
-
-
Blom, R.1
-
9
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
10.1109/18.259647 0801.94011 1281712
-
Menezes, A.; Okamoto, T.; & Vanstone, S. (1993). Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Transactions on Information Theory, 39, 1639-1646.
-
(1993)
IEEE Transactions on Information Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
|