Secure Group Communications Over Data Networks
暂无分享,去创建一个
[1] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[2] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[3] Ashok Samal,et al. Efficient private group communication over public networks , 1999 .
[4] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[5] Louise E. Moser,et al. The SecureRing protocols for securing group communication , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[6] K. J. Ray Liu,et al. An efficient key management scheme for secure wireless multicast , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[7] Tony Ballardie,et al. Scalable Multicast Key Distribution , 1996, RFC.
[8] Matthew J. Moyer,et al. A survey of security issues in multicast communications , 1999, IEEE Network.
[9] Chu-Hsing Lin,et al. Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..
[10] Rolf Blom,et al. An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.
[11] Gene Tsudik,et al. Communication-Efficient Group Key Agreement , 2001, SEC.
[12] Ashok Samal,et al. A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
[13] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[14] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[15] Byrav Ramamurthy,et al. Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication , 2001, ICICS.
[16] Chin-Tser Huang,et al. Key trees and the security of interval multicast , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[17] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[18] Gene Tsudik,et al. Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[19] Adi Shamir,et al. How to share a secret , 1979, CACM.
[20] Bernhard Plattner,et al. Efficient security for large and dynamic multicast groups , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[21] Xiaozhou Li,et al. Batch Updates of Key Trees , 2000 .
[22] Dalit Naor,et al. Broadcast Encryption , 1993, Encyclopedia of Multimedia.
[23] Yang Richard Yang,et al. Protocol design for scalable and reliable group rekeying , 2001, TNET.
[24] Lionel M. Ni,et al. Towards solving multicast key management problem , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[25] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[26] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[27] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[28] Carlo Blundo,et al. Space Requirements for Broadcast Encryption , 1994, EUROCRYPT.
[29] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[30] Amos Beimel,et al. Interaction in Key Distribution Schemes (Extended Abstract) , 1993, CRYPTO.
[31] Whitfield Diffie,et al. A Secure Audio Teleconference System , 1988, CRYPTO.
[32] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[33] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[34] Yvo Desmedt,et al. Efficient and Secure Conference-Key Distribution , 1996, Security Protocols Workshop.
[35] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[36] Yvo Desmedt,et al. Unconditionally secure dynamic conference key distribution , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[37] Yvo Desmedt,et al. A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.
[38] A. J. Surkan,et al. A new random number generator from permutation groups , 1985 .
[39] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[40] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[41] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[42] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[43] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[44] Chak-Kuen Wong,et al. A conference key distribution system , 1982, IEEE Trans. Inf. Theory.
[45] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[46] Eric Harder,et al. Logical Key Hierarchy Protocol , 1999 .
[47] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[48] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[49] Michael K. Reiter,et al. Secure agreement protocols: reliable and atomic group multicast in rampart , 1994, CCS '94.
[50] Bobby Bhattacharjee,et al. Scalable secure group communication over IP multicast , 2002, IEEE J. Sel. Areas Commun..
[51] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[52] Uta Wille,et al. Communication complexity of group key distribution , 1998, CCS '98.
[53] Stafford E. Tavares,et al. Flexible Access Control with Master Keys , 1989, CRYPTO.
[54] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[55] Bradley Cain,et al. Status of this Memo , 1985 .
[56] Ran Canetti,et al. Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.
[57] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[58] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[59] Wei-Chi Ku,et al. An Improved Key Management Scheme for Large Dynamic Groups Using One-Way Function Trees , 2003, ICPP Workshops.
[60] Refik Molva,et al. Scalable multicast security in dynamic groups , 1999, CCS '99.