Key management for restricted multicast using broadcast encryption
IEEE/ACM Transactions on Networking (TON)
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
An authorization infrastructure for nomadic computing
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Coding Constructions for Blacklisting Problems without Computational Assumptions
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Towards Making Broadcast Encryption Practical
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem
Proceedings of the 8th IMA International Conference on Cryptography and Coding
An adaptive tree structure algorithm for efficient key management in group communication
ICCC '02 Proceedings of the 15th international conference on Computer communication
Design of Self-Healing Key Distribution Schemes
Designs, Codes and Cryptography
A unified model for unconditionally secure key distribution
Journal of Computer Security
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
A novel Conference Key Management solution for Secure Dynamic Conferencing
International Journal of Security and Networks
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An intelligent and efficient traitor tracing for ubiquitous environments
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Privacy-preserving identity-based broadcast encryption
Information Fusion
Hi-index | 5.23 |