A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
暂无分享,去创建一个
[1] Eli Upfal,et al. Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .
[2] Russ Bubley,et al. Randomized algorithms , 2018, CSUR.
[3] Ranveer Chandra,et al. Anonymous Gossip: improving multicast reliability in mobile ad-hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems.
[4] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[5] Kazukuni Kobara,et al. Broadcast encryption with short keys and transmissions , 2003, DRM '03.
[6] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[7] Adrian Perrig,et al. Distillation Codes and Applications to DoS Resistant Multicast Authentication , 2004, NDSS.
[8] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[9] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[10] Malibu Canyon RdMalibu. Keystone: a Group Key Management Service , 2000 .
[11] Donggang Liu,et al. Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.
[12] S. Zhu,et al. GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[13] Sung-Ju Lee,et al. On-Demand Multicast Routing Protocol (ODMRP) for Ad-Hoc Networks , 2002 .
[14] Yang Richard Yang,et al. Protocol design for scalable and reliable group rekeying , 2001, TNET.
[15] Shouhuai Xu,et al. Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[16] Xiaozhou Li,et al. Reliable group rekeying: a performance analysis , 2001, SIGCOMM '01.
[17] Charles E. Perkins,et al. Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.
[18] Ran Canetti,et al. Efficient Communication-Storage Tradeoffs for Multicast Encryption , 1999, EUROCRYPT.
[19] Sushil Jajodia,et al. A comparative performance analysis of reliable group rekey transport protocols for secure multicast , 2002, Perform. Evaluation.
[20] Moni Naor,et al. Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[21] Matthew K. Franklin,et al. Self-healing key distribution with revocation , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[22] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[23] Alan T. Sherman,et al. Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..
[24] Michael Luby,et al. A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.
[25] Patrick Th. Eugster,et al. Route driven gossip: probabilistic reliable multicast in ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[26] Michael T. Goodrich,et al. Efficient Tree-Based Revocation in Groups of Low-State Devices , 2004, CRYPTO.
[27] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[28] Brent Waters,et al. Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.
[29] Dong Hoon Lee,et al. One-Way Chain Based Broadcast Encryption Schemes , 2005, EUROCRYPT.
[30] Benny Pinkas. Efficient state updates for key management , 2004, Proceedings of the IEEE.
[31] Daniel A. Spielman,et al. Efficient erasure correcting codes , 2001, IEEE Trans. Inf. Theory.
[32] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[33] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.