메뉴 건너뛰기




Volumn 1716, Issue , 1999, Pages 1-14

Broadcast authentication in group communication

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; COMPUTATION THEORY; COMPUTER NETWORKS; CRYPTOGRAPHY; DISTRIBUTED COMPUTER SYSTEMS; MULTICASTING; SECURITY OF DATA;

EID: 84956852177     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (24)
  • 3
    • 0345952600 scopus 로고    scopus 로고
    • Combinatorics and Threshold Cryptology
    • Chapman & Hall/CRC Res. Notes Mat
    • S. R. Blackburn, Combinatorics and Threshold Cryptology, in Combinatorial Designs and their Applications, Chapman & Hall/CRC Res. Notes Math. Vol. 403(1997), 49-70. 407, 408
    • (1997) Combinatorial Designs and Their Applications , vol.403 , pp. 49-70
    • Blackburn, S.R.1
  • 8
    • 0026992399 scopus 로고
    • Multi-receiver/Multi-sender network security
    • efficient authenticated multicast/feedback
    • Y. Desmedt, Y. Frankel and M. Yung, Multi-receiver/Multi-sender network security: efficient authenticated multicast/feedback, IEEE Infocom’92, (1992) 2045-2054. 400, 402, 406
    • (1992) IEEE Infocom’92 , pp. 2045-2054
    • Desmedt, Y.1    Frankel, Y.2    Yung, M.3
  • 10
    • 84979291225 scopus 로고
    • Broadcast Encryption. In “Advances in Cryptology – Crypto’93”
    • A. Fiat and M. Naor, Broadcast Encryption. In “Advances in Cryptology – Crypto’93”, Lecture Notes in Computer Science 773 (1994), 480-491. 407, 408
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 11
    • 0030122596 scopus 로고    scopus 로고
    • Combinatorial bounds and design of broadcast authentication
    • H. Fujii, W. Kachen and K. Kurosawa, Combinatorial bounds and design of broadcast authentication, IEICE Trans., VolE79-A, No. 4(1996)502-506. 402
    • (1996) IEICE Trans. , Issue.4 , pp. 502-506
    • Fujii, H.1    Kachen, W.2    Kurosawa, K.3
  • 12
    • 0025212474 scopus 로고
    • A matrix key-distribution scheme
    • L. Gong and D. J. Wheeler, A matrix key-distribution scheme. J. Cryptology, Vol.2(1990), 51-59. 404
    • (1990) J. Cryptology , vol.2 , pp. 51-59
    • Gong, L.1    Wheeler, D.J.2
  • 13
    • 84957875373 scopus 로고    scopus 로고
    • Characterization of (K, n) multi-receiver authentication
    • Lecture Notes in Comput. Sci
    • K. Kurosawa and S. Obana, Characterization of (k, n) multi-receiver authentication, Information Security and Privacy, ACISP’97, Lecture Notes in Comput. Sci. 1270,(1997) 204-215. 402
    • (1997) Information Security and Privacy , vol.402 , pp. 204-215
    • Kurosawa, K.1    Obana, S.2
  • 14
    • 0002874527 scopus 로고
    • Incidence structures for key sharing
    • (Advances in Cryptology–Asiacrypt’94)
    • T. Matsumoto, Incidence structures for key sharing, Lecture Notes in Computer Science 917(1995), 242-253(Advances in Cryptology–Asiacrypt’94). 404
    • (1995) Lecture Notes in Computer Science , pp. 242-253
    • Matsumoto, T.1
  • 17
    • 0002828874 scopus 로고    scopus 로고
    • Key distribution patterns using Minkowski planes.Designs
    • C. M. O’Keefe, Key distribution patterns using Minkowski planes.Designs, Codes and Cryptography 5(1995) 261-267. 404
    • Codes and Cryptography , vol.404 , pp. 261-267
    • O’ Keefe, C.M.1
  • 18
    • 84957715332 scopus 로고    scopus 로고
    • New results on multi-receiver authentication code
    • Lecture Notes in Computer Science
    • R. Safavi-Naini and H. Wang, New results on multi-receiver authentication codes, Advances in Cryptology – Eurocrypt’98, Lecture Notes in Computer Science, 1438(1998), 527-541. 400, 401, 402, 404
    • (1998) Advances in Cryptology – Eurocrypt’98 , pp. 527-541
    • Safavi-Naini, R.1    Wang, H.2
  • 20
    • 0001531989 scopus 로고    scopus 로고
    • Multireceiver authentication codes: Models, bounds, constructions and extensions
    • R. Safavi-Naini and H. Wang, Multireceiver authentication codes: models, bounds, constructions and extensions, Information and Computation 151(1999), 148-172 401, 404
    • (1999) Information and Computation , pp. 148-172
    • Safavi-Naini, R.1    Wang, H.2
  • 21
    • 0003959092 scopus 로고
    • G.J. Simmons, ed., IEEE Press
    • G. J. Simmons, A survey of information authentication, in Contemporary Cryptol-ogy, The Science of Information Integrity, G.J. Simmons, ed., IEEE Press, (1992), 379-419.
    • (1992) Survey of information authentication , pp. 379-419
    • Simmons, G.J.1
  • 22
    • 0000028420 scopus 로고    scopus 로고
    • On some methods for unconditionally secure key distribution and broadcast encryption
    • D. R. Stinson, On some methods for unconditionally secure key distribution and broadcast encryption. Designs, Codes and Cryptography, 12(1997), 215-243. 404, 408
    • (1997) Designs, Codes and Cryptography , pp. 215-243
    • Stinson, D.R.1
  • 23
    • 0002808611 scopus 로고    scopus 로고
    • Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
    • D. R. Stinson, T. van Trung and R. Wei, Secure frameproof codes, key distribution patterns, group testing algorithms and related structures, J. Statist. Plan. Infer., to appear. 401, 404
    • J. Statist. Plan. Infer., to Appear. , vol.401-404
    • Stinson, D.R.1    Van Trung, T.2    Wei, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.