A secure audio teleconference system
CRYPTO '88 Proceedings on Advances in cryptology
Cryptosystem for group oriented cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
The digital signature standard
Communications of the ACM
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Remarks on "The Design of a Conference Key Distribution System"
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
An Efficient Off-line Electronic Cash System Based On The Representation Problem.
A Secure Group Membership Protocol
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Scalable multicast security in dynamic groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Security analysis of the cliques protocols suites: first results
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Secure multicast in wireless networks of mobile hosts: protocols and issues
Mobile Networks and Applications
Using Compatible Keys for Secure Multicasting in E-Commerce
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
The Group Diffie-Hellman Problems
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Dynamic Group Key Management Protocol
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Network Security in the Multicast Framework
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Some Open Issues and New Directions in Group Signatures
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Efficient Kerberized Multicast in a Practical Distributed Setting
ISC '01 Proceedings of the 4th International Conference on Information Security
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Efficient Construction of (Distributed) Verifiable Random Functions
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Network security in the multicast framework
Advanced lectures on networking
Multiparty authentication services and key agreement protocols with semi-trusted third party
Journal of Computer Science and Technology
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Number-theoretic constructions of efficient pseudo-random functions
Journal of the ACM (JACM)
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
A secure and scalable group key exchange system
Information Processing Letters
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Energy-efficient and scalable group key agreement for large ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Authentication based on multilayer clustering in ad hoc networks
EURASIP Journal on Wireless Communications and Networking
Modeling key agreement in multi-hop ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
Journal of Computer Security
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
A privacy-preserving interdomain audit framework
Proceedings of the 5th ACM workshop on Privacy in electronic society
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
A communication-computation efficient group key algorithm for large and dynamic groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Hierarchy-based key management for secure group communications in mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
Journal of Systems and Software
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
A tapestry of identity-based encryption: practical frameworks compared
International Journal of Applied Cryptography
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
International Journal of Wireless and Mobile Computing
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Adaptive trust-based anonymous network
International Journal of Security and Networks
Low-power authenticated group key agreement for heterogeneous wireless networks
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Proving Group Protocols Secure Against Eavesdroppers
IJCAR '08 Proceedings of the 4th international joint conference on Automated Reasoning
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
Secure and Efficient Group Key Agreements for Cluster Based Networks
Transactions on Computational Science IV
Efficient and provably secure password-based group key agreement protocol
Computer Standards & Interfaces
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
Authenticated Key Exchange Protocol in One-Round
ICA3PP '09 Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing
Byzantine Agreement under dual failure mobile network
Computer Standards & Interfaces
Design of efficient ternary-tree based group key agreement protocol for dynamic groups
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Usable key agreement in home networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
A security framework for Content-Based Publish-Subscribe system
Electronic Commerce Research and Applications
Attacking Group Multicast Key Management Protocols Using Coral
Electronic Notes in Theoretical Computer Science (ENTCS)
A secure and scalable Group Key Exchange system
Information Processing Letters
Reaching reliable agreement on wireless mobile network
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
REP: Location Privacy for VANETs Using Random Encryption Periods
Mobile Networks and Applications
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Securing a path-coupled NAT/firewall signaling protocol
IPOM'07 Proceedings of the 7th IEEE international conference on IP operations and management
A generalization of DDH with applications to protocol analysis and computational soundness
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Secure and scalable communication in vehicle ad hoc networks
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords
ICICS'07 Proceedings of the 9th international conference on Information and communications security
A novel group key management based on Jacobian Elliptic Chebyshev rational map
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
An efficient key management scheme for live streaming
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A group-based key management protocol for mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
A Multi-service Group Key Management Scheme for Stateless Receivers in Wireless Mesh Networks
Mobile Networks and Applications
An efficient dynamic group key agreement protocol for imbalanced wireless networks
International Journal of Network Management
Key management with host mobility in dynamic groups
Proceedings of the 3rd international conference on Security of information and networks
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
On performance of group key distribution techniques when applied to IPTV services
Computer Communications
A clique-based secure admission control scheme for mobile ad hoc networks (MANETs)
Journal of Network and Computer Applications
Modeling key compromise impersonation attacks on group key exchange protocols
ACM Transactions on Information and System Security (TISSEC)
Wireless Personal Communications: An International Journal
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
A simple group diffie-hellman key agreement protocol without member serialization
CIS'04 Proceedings of the First international conference on Computational and Information Science
Group key agreement protocol among mobile devices in different cells
ISPA'06 Proceedings of the 2006 international conference on Frontiers of High Performance Computing and Networking
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Group key agreement protocol based on GH-KEP
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Partial group session key agreement scheme for mobile agents in e-commerce environment
PRIMA'06 Proceedings of the 9th Pacific Rim international conference on Agent Computing and Multi-Agent Systems
A novel convinced diffie-hellman computation scheme and its cryptographic application
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part IV
Secure group communications over combined wired and wireless networks
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
A verifiable random function with short proofs and keys
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
N-Party encrypted diffie-hellman key exchange using different passwords
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Secure group instant messaging using cryptographic primitives
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Constant round dynamic group key agreement
ISC'05 Proceedings of the 8th international conference on Information Security
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
Flexible group key exchange with on-demand computation of subgroup keys
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Ad hoc security associations for groups
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An access control scheme for partially ordered set hierarchy with provable security
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Password-Based authenticated key exchange
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
The performance of public key-based authentication protocols
NSS'12 Proceedings of the 6th international conference on Network and System Security
A communication efficient group key distribution scheme for MANETs
NSS'12 Proceedings of the 6th international conference on Network and System Security
A new authenticated group key transfer protocol for actual network environment
International Journal of Ad Hoc and Ubiquitous Computing
Autonomous Shared Key Management Scheme for Space Networks
Wireless Personal Communications: An International Journal
A New Secure Authenticated Group Key Transfer Protocol
Wireless Personal Communications: An International Journal
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications
Hi-index | 0.01 |