-
1
-
-
0000205020
-
Efficient Communication-Storage Tradeoffs for Multicast Encryption
-
R. Canetti, T. Malkin, and K. Nissim, “Efficient Communication-Storage Tradeoffs for Multicast Encryption", In Eurocrypt 99, pp. 456-470.
-
Eurocrypt 99
, pp. 456-470
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
2
-
-
84889281816
-
-
John Wiley & Sons, Inc, NY
-
T. Cover, J. Thomas, Elements of Information Theory, John Wiley & Sons, Inc, NY, 1991.
-
(1991)
Elements of Information Theory
-
-
Cover, T.1
Thomas, J.2
-
4
-
-
0022311176
-
“An Information-Theoretic Approach to Algorithms”, Impact of Processing Techniques in Communications
-
J. L. Massey, “An Information-Theoretic Approach to Algorithms", Impact of Processing Techniques in Communications, In NATO Advanced Study Institutes Series E91, pp. 3-20, 1985.
-
(1985)
NATO Advanced Study Institutes Series E91
, pp. 3-20
-
-
Massey, J.L.1
-
5
-
-
0028462422
-
Some Applications of Source Coding to Cryptography"
-
July-August
-
J. L. Massey, Some Applications of Source Coding to Cryptography", In European Trans. on Telecom., Vol. 5, pp. 421-429, July-August 1994.
-
(1994)
European Trans. On Telecom
, vol.5
, pp. 421-429
-
-
Massey, J.L.1
-
6
-
-
0002831785
-
An Information-Theoretic Approach to Homomorphic Substitution
-
H. N. Jendal, Y. J. B. Khun, and J. L. Massey, “An Information-Theoretic Approach to Homomorphic Substitution", In Advances in Cryptology-Eurocrypt'89, LNCS-434, pp. 382-394, 1990.
-
(1990)
Advances in Cryptology-Eurocrypt'89, LNCS-434
, pp. 382-394
-
-
Jendal, H.N.1
Khun, Y.J.2
Massey, J.L.3
-
7
-
-
0027599802
-
Secret Key Agreement by Public Discussion from Common Information
-
U. M. Maurer, “Secret Key Agreement by Public Discussion from Common Information", In IEEE Trans. IT, Vol 39, No. 3, 1993, pp 733-742.
-
(1993)
IEEE Trans. IT
, vol.39
, Issue.3
, pp. 733-742
-
-
Maurer, U.M.1
-
8
-
-
0006422068
-
A taxonomy of multicast security issues
-
R. Canetti, and B. Pinkas, “A taxonomy of multicast security issues", Internet draft, April 1999.
-
(1999)
Internet Draft
-
-
Canetti, R.1
Pinkas, B.2
-
9
-
-
0026992399
-
Multi-receiver/Multi-sender network security: Efficient authenticated multicast feedback
-
Y. Desmedt, Y. Frankel, and M. Yung, “Multi-receiver/Multi-sender network security: efficient authenticated multicast feedback", IEEE Infocom'92, pp. 2045-2054.
-
IEEE Infocom'92
, pp. 2045-2054
-
-
Desmedt, Y.1
Frankel, Y.2
Yung, M.3
-
11
-
-
0032661699
-
Multicast Security: A Taxonomy and Efficient Reconstructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, B. Pinkas, “Multicast Security: A Taxonomy and Efficient Reconstructions", Proceedings of IEEE Infocom'99.
-
Proceedings of IEEE Infocom'99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
12
-
-
0005102441
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
-
D. A. McGrew and A. Sherman, “Key Establishment in Large Dynamic Groups Using One-Way Function Trees", Manuscript, 1998.
-
(1998)
Manuscript
-
-
McGrew, D.A.1
Sherman, A.2
-
13
-
-
84979291225
-
Broadcast Encryption
-
Springer-Verlag, Berlin Germany
-
A. Fiat and M. Naor, “Broadcast Encryption", Advances in Cryptology- Crypto'92, Lecture Notes in Computer Science. vol. 773, pp. 481-491, Springer-Verlag, Berlin Germany, 1993.
-
(1993)
Advances in Cryptology- Crypto'92, Lecture Notes in Computer Science
, vol.773
, pp. 481-491
-
-
Fiat, A.1
Naor, M.2
-
14
-
-
84944878354
-
-
CRC Press, Boca Raton
-
A. Menezes, P. van Oorschot, and A. Vanstone, \Handbook of Applied Cryptography", CRC Press, Boca Raton, 1997.
-
(1997)
\Handbook of Applied Cryptography"
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, A.3
-
15
-
-
84957617971
-
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs
-
Springer-Verlag, Berlin Germany
-
M. Naor and O. Reingold, “From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs", Advances in Cryptology-Crypto'98, Lecture Notes in Computer Science. vol. 1462, pp. 267-282, Springer-Verlag, Berlin Germany, 1998.
-
(1998)
Advances in Cryptology-Crypto'98, Lecture Notes in Computer Science
, vol.1462
, pp. 267-282
-
-
Naor, M.1
Reingold, O.2
-
17
-
-
84948991087
-
A Secure and E_cient Conference Key Distribution System
-
Springer-Verlag, Berlin Germany
-
M. Brumester and Y. Desmedt, “A Secure and E_cient Conference Key Distribution System", Advances in Cryptology- Eurocrypt'94, Lecture Notes in Computer Science. vol. 950, pp. 275-286, Springer-Verlag, Berlin Germany, 1994.
-
(1994)
Advances in Cryptology- Eurocrypt'94, Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Brumester, M.1
Desmedt, Y.2
-
19
-
-
0002360030
-
Secure Group Communications Using Key Graphs
-
September 2-4, Vancouver, Canada
-
C. K. Wong, M. Gouda, S. S. Lam, “Secure Group Communications Using Key Graphs", In Proceedings of ACM SIGCOMM'98, September 2-4, Vancouver, Canada.
-
Proceedings of ACM SIGCOMM'98
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
20
-
-
0031641387
-
Efficient Security for Large and Dynamic Groups
-
IEEE Computer Society Press
-
G. Caronni, M. Waldvogel, D. Sun, and B. Plattner, “Efficient Security for Large and Dynamic Groups", In Proc. of the Seventh Workshop on Enabling Technologies, IEEE Computer Society Press, 1998.
-
(1998)
Proc. Of the Seventh Workshop on Enabling Technologies
-
-
Caronni, G.1
Waldvogel, M.2
Sun, D.3
Plattner, B.4
-
21
-
-
0032627571
-
Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques
-
I. Chang, R. Engel, D. Kandlur, D. Pendarakis, D. Saha, “Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniques", To apper in Proceedings of IEEE Infocom'99.
-
To Apper in Proceedings of IEEE Infocom'99
-
-
Chang, I.1
Engel, R.2
Kandlur, D.3
Pendarakis, D.4
Saha, D.5
-
22
-
-
0030609312
-
Iolus: A framework for Scalable Secure Multicasting
-
S. Mittra, “Iolus: A framework for Scalable Secure Multicasting", In Proceedings of ACM SIGGCOM'97, pages 277-288, September 1997.
-
(1997)
Proceedings of ACM SIGGCOM'97
, pp. 277-288
-
-
Mittra, S.1
-
24
-
-
84957086054
-
-
Internet Draft, Novenber
-
R. Canetti, P-C. Cheng, D. Pendarakis, J. R. Rao, P. Rohatgi, D. Saha, “An Architecture for Secure Internet Multicast", Internet Draft, Novenber 1998.
-
(1998)
“An Architecture for Secure Internet Multicast"
-
-
Canetti, R.1
Cheng, P.-C.2
Pendarakis, D.3
Rao, J.R.4
Rohatgi, P.5
Saha, D.6
-
25
-
-
0005352931
-
A Framework for Group Key Management for Multicast Security"
-
“
-
T. Hardjono, B. Cain, and N. Doraswamy, “A Framework for Group Key Management for Multicast Security", Internet draft, July 1998.
-
(1998)
Internet Draft
-
-
Hardjono, T.1
Cain, B.2
Doraswamy, N.3
-
26
-
-
0003789153
-
IP Multicast Applications: Challenges and Solutions
-
B. Quinn, “IP Multicast Applications: Challenges and Solutions", Internet draft, November 1998.
-
(1998)
Internet Draft
-
-
Quinn, B.1
-
28
-
-
0003308056
-
Scalable Multicast Key Distribution
-
A. Ballardie. “Scalable Multicast Key Distribution". Internet RFC 1949, May 1996.
-
(1996)
Internet RFC 1949
-
-
Ballardie, A.1
|