A secure broadcasting cryptosystem and its application to grid computing
暂无分享,去创建一个
[1] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[2] Heon Young Yeom,et al. Generalized data retrieval for pyramid-based periodic broadcasting of videos , 2004, Future Gener. Comput. Syst..
[3] Wen Tao Zhu. General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach , 2008, 2008 IEEE International Conference on Communications.
[4] Wen-Tsuen Chen,et al. Secure Broadcasting Using the Secure Lock , 1989, IEEE Trans. Software Eng..
[5] Hung-Min Sun. Security of broadcasting cryptosystem in computer networks , 1999 .
[6] Antonio F. Gómez-Skarmeta,et al. Semantic-based authorization architecture for Grid , 2011, Future Gener. Comput. Syst..
[7] Sonia Sharama,et al. Grid Computing , 2004, Lecture Notes in Computer Science.
[8] Yuh-Min Tseng,et al. Cryptanalysis of Liaw's broadcasting Cryptosystem , 2001 .
[9] Hai Jin,et al. Constructing trusted virtual execution environment in P2P grids , 2010, Future Gener. Comput. Syst..
[10] Chen Qi,et al. An Approach on Analyzing Histogram and Selecting Threshold , 2008, 2008 International Conference on Computer Science and Software Engineering.
[11] Dafang Zhang,et al. DHT-based lightweight broadcast algorithms in large-scale computing infrastructures , 2010, Future Gener. Comput. Syst..
[12] Il Seok Ko,et al. A multilayered digital content distribution using a group-key based on web , 2009, Future Gener. Comput. Syst..
[13] Alberto Peinado,et al. Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem , 2006, J. Inf. Sci. Eng..
[14] Jianhua Li,et al. Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint , 2010, Future Gener. Comput. Syst..
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[16] Ruay-Shiung Chang,et al. A new mechanism for resource monitoring in Grid computing , 2009, Future Gener. Comput. Syst..
[17] Angelos D. Keromytis,et al. Anonymity in Wireless Broadcast Networks , 2009, Int. J. Netw. Secur..
[18] Horng-Twu Liaw. Broadcasting cryptosystem in computer networks , 1999 .
[19] Mahalingam Ramkumar. Broadcast Authentication With Preferred Verifiers , 2007, Int. J. Netw. Secur..
[20] Chin-Chen Chang,et al. A new key assignment scheme for enforcing complicated access control policies in hierarchy , 2003, Future Gener. Comput. Syst..
[21] Yong Zhang,et al. A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.
[22] Gene Tsudik,et al. Refinement and extension of encrypted key exchange , 1995, OPSR.
[23] Jordi Herrera Joancomartí,et al. JXTA resource access control by means of advertisement encryption , 2010 .
[24] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[25] Yuan-Shun Dai,et al. Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups , 2007, Future Gener. Comput. Syst..
[26] C. Sanges,et al. An optimized broadcasting technique for WK-recursive topologies , 1990, Future Gener. Comput. Syst..
[27] Fabio Martinelli,et al. On usage control for GRID systems , 2010, Future Gener. Comput. Syst..
[28] Eun-Jun Yoon,et al. Robust Broadcasting Cryptosystem in Computer Networks , 2009, 2009 Workshops at the Grid and Pervasive Computing Conference.
[29] Mark Manulis,et al. Tree-based group key agreement framework for mobile ad-hoc networks , 2007, Future Gener. Comput. Syst..
[30] Xiaogang Wang,et al. A potential HTTP-based application-level attack against Tor , 2011, Future Gener. Comput. Syst..
[31] Mark Manulis,et al. Tree-Based Group Key Agreement Framework for Mobile Ad-Hoc Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[32] Cc Chang,et al. BROADCASTING CRYPTOSYSTEM IN COMPUTER-NETWORKS USING INTERPOLATING POLYNOMIALS , 1991 .
[33] Wen Tao Zhu,et al. Security of the redefined Liaw's broadcasting cryptosystem , 2008, Comput. Math. Appl..
[34] Jean-Paul A. Barthès. OMAS - a flexible multi-agent environment for CSCWD , 2011, Future Gener. Comput. Syst..
[35] Bernd Freisleben,et al. Secure on-demand grid computing , 2009, Future Gener. Comput. Syst..