Efficient Authenticated Key Agreement Protocol for Dynamic Groups
暂无分享,去创建一个
[1] Emmanuel Bresson,et al. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions , 2002, EUROCRYPT.
[2] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[3] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[4] Gene Tsudik,et al. New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.
[5] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[6] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[7] Wen-Guey Tzeng,et al. Round-Efficient Conference Key Agreement Protocols with Provable Security , 2000, ASIACRYPT.
[8] Emmanuel Bresson,et al. Provably authenticated group Diffie-Hellman key exchange , 2001, CCS '01.
[9] Gene Tsudik,et al. Communication-Efficient Group Key Agreement , 2001, SEC.
[10] Alfred Menezes,et al. Progress in Cryptology — INDOCRYPT 2002 , 2002, Lecture Notes in Computer Science.
[11] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Kazukuni Kobara,et al. Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions , 2003, IACR Cryptol. ePrint Arch..
[14] Yvo Desmedt,et al. Towards practical “proven secure” authenticated key distribution , 1993, CCS '93.
[15] Whitfield Diffie,et al. A Secure Audio Teleconference System , 1988, CRYPTO.
[16] Emmanuel Bresson,et al. Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case , 2001, ASIACRYPT.
[17] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[18] Shiuh-Pyng Shieh,et al. Secure key agreement for group communications , 2001, Int. J. Netw. Manag..
[19] Kwangjo Kim,et al. An Efficient Tree-Based Group Key Agreement Using Bilinear Map , 2003, ACNS.
[20] Vassilios Chrissikopoulos,et al. Efficient and provably secure key agreement , 1996, SEC.
[21] Maarit Hietalahti. Key Establishment in Ad-hoc Networks , 2001 .
[22] Jean-Jacques Quisquater,et al. A security analysis of the cliques protocols suites , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[23] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[24] Jonathan Katz,et al. Scalable Protocols for Authenticated Group Key Exchange , 2003, Journal of Cryptology.
[25] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[26] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[27] Shafi Goldwasser,et al. Advances in Cryptology — CRYPTO’ 88: Proceedings , 1990, Lecture Notes in Computer Science.
[28] Taekyoung Kwon,et al. Authentication and Key Agreement Via Memorable Passwords , 2001, NDSS.
[29] Kazukuni Kobara,et al. Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[30] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[31] Mike Burmester,et al. On the Risk of Opening Distributed Keys , 1994, CRYPTO.
[32] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[33] Rafail Ostrovsky,et al. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords , 2001, EUROCRYPT.
[34] Colin Boyd,et al. Round-Optimal Contributory Conference Key Agreement , 2003, Public Key Cryptography.
[35] K. C. Reddy,et al. Identity Based Authenticated Group Key Agreement Protocol , 2002, INDOCRYPT.
[36] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[37] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.