Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Group key")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 77

  • Page / 4
Export

Selection :

  • and

A group key distribution scheme with decentralised user joinKURNIO, Hartono; SAFAVI-NAINI, Rei; HUAXIONG WANG et al.Lecture notes in computer science. 2003, pp 146-163, issn 0302-9743, isbn 3-540-00420-3, 18 p.Conference Paper

On the performance of group key agreement protocolsAMIR, Yair; KIM, Yongdae; NITA-ROTARU, Cristina et al.Proceedings of the ... International Conference on Distributed Computing Systems. 2002, pp 463-464, issn 1063-6927, isbn 0-7695-1585-1, 2 p.Conference Paper

A group key agreement protocol from pairingsDUURSMA, Iwan; LEE, Hyang-Sook.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 1451-1456, issn 0096-3003, 6 p.Article

An enhanced one way function tree rekey protocol based on chinese remainder theoremPARVATHA VARTHINI, B; VALLI, S.Lecture notes in computer science. 2005, pp 33-43, issn 0302-9743, isbn 3-540-29414-7, 1Vol, 11 p.Conference Paper

Intrusion-tolerant enclavesDUTERTRE, Bruno; CRETTAZ, Valentin; STAVRIDOU, Victoria et al.Proceedings - IEEE Symposium on Security and Privacy. 2002, pp 216-224, issn 1081-6011, isbn 0-7695-1543-6, 9 p.Conference Paper

Attribute-based on-demand multicast group setup with membership anonymitySHUCHENG YU; KUI REN; WENJING LOU et al.Computer networks (1999). 2010, Vol 54, Num 3, pp 377-386, issn 1389-1286, 10 p.Article

An anonymous DRM scheme for sharing multimedia files in P2P networksCHEN, Yi-Ming; WU, Wei-Chen.Multimedia tools and applications. 2014, Vol 69, Num 3, pp 1041-1065, issn 1380-7501, 25 p.Article

A secure and scalable Group Key Exchange systemBURMESTER, Mike; DESMEDT, Yvo.Information processing letters. 2005, Vol 94, Num 3, pp 137-143, issn 0020-0190, 7 p.Article

An efficient group key agreement protocolBAE EUN JUNG.IEEE communications letters. 2006, Vol 10, Num 2, pp 106-107, issn 1089-7798, 2 p.Article

A Scalable Group Key Management ProtocolRONGGONG SONG; KORBA, Larry; YEE, George O. M et al.IEEE communications letters. 2008, Vol 12, Num 7, pp 541-543, issn 1089-7798, 3 p.Article

Security weakness in an authenticated group key agreement protocol in two roundsJUNG YEON HWANG; KYU YOUNG CHOI; DONG HOON LEE et al.Computer communications. 2008, Vol 31, Num 15, pp 3719-3724, issn 0140-3664, 6 p.Article

A lightweight group-key management protocol for secure ad-hoc-network routingCASTRO FERNANDES, Natalia; BANDEIRA DUARTE, Otto Carlos Muniz.Computer networks (1999). 2011, Vol 55, Num 3, pp 759-778, issn 1389-1286, 20 p.Article

Tuning a two-round group key agreementWEIZHENG GAO; NEUPANE, Kashi; STEINWANDT, Rainer et al.International journal of information security (Print). 2014, Vol 13, Num 5, pp 467-476, issn 1615-5262, 10 p.Article

Provably Secure Constant Round Contributory Group Key Agreement in Dynamic SettingDUTTA, Ratna; BAMA, Rana.IEEE transactions on information theory. 2008, Vol 54, Num 5, pp 2007-2025, issn 0018-9448, 19 p.Article

An efficient key distribution scheme with self-healing propertyHONG, Dowon; KANG, Ju-Sung.IEEE communications letters. 2005, Vol 9, Num 8, pp 759-761, issn 1089-7798, 3 p.Article

A novel authenticated group key agreement protocol for mobile environmentTSAI, Jia-Lun.Annales des télécommunications. 2011, Vol 66, Num 11-12, pp 663-669, issn 0003-4347, 7 p.Article

An efficient LKH tree balancing algorithm for group key managementKWAK, Deuk-Whee; LEE, Seungjoo; KIM, Jongwon et al.IEEE communications letters. 2006, Vol 10, Num 3, pp 222-224, issn 1089-7798, 3 p.Article

A computationally efficient key-hiding based group re-keying scheme for secure multicastingASEM, Y. M; KARA, A.International journal of computers & applications. 2006, Vol 28, Num 1, pp 65-73, issn 1206-212X, 9 p.Article

Improvements on Sun et al.'s Conditional Access System in Pay-TV Broadcasting SystemsKIM, Jung-Yoon; CHOI, Hyoung-Kee.IEEE transactions on multimedia. 2010, Vol 12, Num 4, pp 337-340, issn 1520-9210, 4 p.Article

A survey of key management for secure group communicationRAFAELI, Sandro; HUTCHISON, David.ACM computing surveys. 2003, Vol 35, Num 3, pp 309-329, issn 0360-0300, 21 p.Article

Analysis and improvement of a new authenticated group key agreement in a mobile environmentCHENG, Qing-Feng; MA, Chuan-Gui; WEI, Fu-Shan et al.Annales des télécommunications. 2011, Vol 66, Num 5-6, pp 331-337, issn 0003-4347, 7 p.Article

A communication-computation efficient group key algorithm for large and dynamic groupsSHANYU ZHENG; MANZ, David; ALVES-FOSS, Jim et al.Computer networks (1999). 2007, Vol 51, Num 1, pp 69-93, issn 1389-1286, 25 p.Article

A general compiler for password-authenticated group key exchange protocolHUI LI; WU, Chuan-Kun; JUN SUN et al.Information processing letters. 2010, Vol 110, Num 4, pp 160-167, issn 0020-0190, 8 p.Article

A hierarchical group key management scheme for secure multicast increasing efficiency of key distribution in leave operationALIREZA NEMANEY POUR; KUMEKAWA, Kazuya; KATO, Toshihiko et al.Computer networks (1999). 2007, Vol 51, Num 17, pp 4727-4743, issn 1389-1286, 17 p.Article

A weakness in the bresson-chevassut-essiari-pointcheval's group key agreement scheme for low-power mobile devicesNAM, Junghyun; KIM, Seungjoo; WON, Dongho et al.IEEE communications letters. 2005, Vol 9, Num 5, pp 429-431, issn 1089-7798, 3 p.Article

  • Page / 4