Communications of the ACM
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Approximation algorithms for NP-hard problems
Approximation algorithms for NP-hard problems
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Generalized Beimal-Chor schemes for broadcast encryption and interactive key distribution
Theoretical Computer Science
A threshold of ln n for approximating set cover
Journal of the ACM (JACM)
Key management for encrypted broadcast
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
On location-restricted services
IEEE Network: The Magazine of Global Internetworking
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
An adaptive tree structure algorithm for efficient key management in group communication
ICCC '02 Proceedings of the 15th international conference on Computer communication
On the Economics of Multicasting
Netnomics
Graceful service degradation (or, how to know your payment is late)
Proceedings of the 6th ACM conference on Electronic commerce
Key management for high bandwidth secure multicast
Journal of Computer Security
Remote revocation of smart cards in a private DRM system
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
A computationally efficient key-hiding based group re-keying scheme for secure multicasting
International Journal of Computers and Applications
A practical revocation scheme for broadcast encryption using smartcards
ACM Transactions on Information and System Security (TISSEC)
Improved efficiency for revocation schemes via Newton interpolation
ACM Transactions on Information and System Security (TISSEC)
A near-optimal multicast scheme for mobile ad hoc networks using a hybrid genetic algorithm
Expert Systems with Applications: An International Journal
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
Supporting flexible streaming media protection through privacy-aware secure processors
Computers and Electrical Engineering
Complexity comparison of Lagrange and Newton polynomial based revocation schemes
ECC'08 Proceedings of the 2nd conference on European computing conference
Optimal subset-difference broadcast encryption with free riders
Information Sciences: an International Journal
Efficient broadcast encryption with user profiles
Information Sciences: an International Journal
Wireless broadcast encryption based on smart cards
Wireless Networks
Hierarchies of keys in secure multicast communications
Journal of Computer Security
FPGA implementation of a Greedy algorithm for set covering
RTC'05 Proceedings of the 14th IEEE-NPSS conference on Real time
An intelligent and efficient traitor tracing for ubiquitous environments
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Fast algorithms for the free riders problem in broadcast encryption
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
Privacy-preserving identity-based broadcast encryption
Information Fusion
Fast transmission to remote cooperative groups: a new key management paradigm
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.01 |