A course in number theory and cryptography
A course in number theory and cryptography
Multiparty unconditionally secure protocols
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Distributed Algorithms
Handbook of Applied Cryptography
Handbook of Applied Cryptography
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Efficient and Secure Conference-Key Distribution
Proceedings of the International Workshop on Security Protocols
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
CLIQUES: A New Approach to Group Key Agreement
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Simple and fault-tolerant key agreement for dynamic collaborative groups
Proceedings of the 7th ACM conference on Computer and communications security
A secure multicast protocol for the internet's multicast backbone
International Journal of Network Management
Secure key agreement for group communications
International Journal of Network Management
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
On the Decidability of Cryptographic Protocols with Open-Ended Data Structures
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 2003 workshop on New security paradigms
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Selecting theories and recursive protocols
CONCUR 2005 - Concurrency Theory
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
On the impossibility of building secure cliques-type authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW17
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
A communication-computation efficient group key algorithm for large and dynamic groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Transducer-based analysis of cryptographic protocols
Information and Computation
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
Securing group key exchange against strong corruptions
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Contracts for Mobile Processes
CONCUR 2009 Proceedings of the 20th International Conference on Concurrency Theory
An on-demand key establishment protocol for MANETs
International Journal of Wireless and Mobile Computing
A general compiler for password-authenticated group key exchange protocol
Information Processing Letters
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
Fully Robust Tree-Diffie-Hellman Group Key Exchange
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Key agreement in ad hoc networks
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
ID-based authenticated multi-group keys agreement scheme for computing grid
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
Practical parameterised session types
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Robust and efficient authentication of video stream broadcasting
ACM Transactions on Information and System Security (TISSEC)
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption
Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming
ID-based multi-party authenticated key agreement protocols from multilinear forms
ISC'05 Proceedings of the 8th international conference on Information Security
Parameterised multiparty session types
FOSSACS'10 Proceedings of the 13th international conference on Foundations of Software Science and Computational Structures
A formal approach for reasoning about a class of diffie-hellman protocols
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Key agreement in ad hoc networks
Computer Communications
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
COMPASS: authenticated group key agreement from signcryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |