Multicast routing in a datagram internetwork
Multicast routing in a datagram internetwork
Sharing the “cost” of multicast trees: an axiomatic analysis
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
FlexiNet—a flexible component oriented middleware system
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Chameleon - A New Kind of Stream Cipher
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Watercasting: Distributed Watermarking of Multicast Media
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Evaluation of Different Video Encryption Methods for a Secure Multimedia Conferencing Gateway
Proceedings of the 4th International COST 237 Workshop on From Multimedia Services to Network Services
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Session key distribution using smart cards
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Group security association (GSA) management in IP multicast
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Application of synchronous dynamic encryption system in mobile wireless domains
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Fingercasting-joint fingerprinting and decryption of broadcast messages
Transactions on data hiding and multimedia security II
Towards end-to-end secure content storage and delivery with public cloud
Proceedings of the second ACM conference on Data and Application Security and Privacy
Fingercasting—Joint fingerprinting and decryption of broadcast messages
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |