A secure audio teleconference system
CRYPTO '88 Proceedings on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Specifying and using a partitionable group communication service
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Communication complexity of group key distribution
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
Secure Group Communications Using Key Graphs
Secure Group Communications Using Key Graphs
ACM Transactions on Information and System Security (TISSEC)
Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Communication-efficient group key agreement
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Secure Key-Evolving Protocols for Discrete Logarithm Schemes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Efficient Revocation Schemes for Secure Multicast
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Identity Based Authenticated Group Key Agreement Protocol
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Revocation Scheme with Minimal Storage at Receivers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient Kerberized Multicast in a Practical Distributed Setting
ISC '01 Proceedings of the 4th International Conference on Information Security
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Exploring Robustness in Group Key Agreement
ICDCS '01 Proceedings of the The 21st International Conference on Distributed Computing Systems
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Secure Group Communication Using Robust Contributory Key Agreement
IEEE Transactions on Parallel and Distributed Systems
A Secure Wireless Agent-based Testbed
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Tree-based group key agreement
ACM Transactions on Information and System Security (TISSEC)
Group Key Agreement Efficient in Communication
IEEE Transactions on Computers
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Exploring adaptability of secure group communication using formal prototyping techniques
ARM '04 Proceedings of the 3rd workshop on Adaptive and reflective middleware
Identity-Based Fault-Tolerant Conference Key Agreement
IEEE Transactions on Dependable and Secure Computing
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Authenticated group key agreement with admission control
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Resource-aware conference key establishment for heterogeneous networks
IEEE/ACM Transactions on Networking (TON)
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
A new approach to scalable and fault-tolerant group key management protocols
Journal of High Speed Networks
DDH-based group key agreement in a mobile environment
Journal of Systems and Software
An efficient group key establishment in location-aided mobile ad hoc networks
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Scalable and fault-tolerant key agreement protocol for dynamic groups
International Journal of Network Management
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
JET: dynamic join-exit-tree amortization and scheduling for contributory key management
IEEE/ACM Transactions on Networking (TON)
A three round authenticated group key agreement protocol for ad hoc networks
Pervasive and Mobile Computing
A communication-computation efficient group key algorithm for large and dynamic groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure multicast in dynamic environments
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Provably secure authenticated group Diffie-Hellman key exchange
ACM Transactions on Information and System Security (TISSEC)
Secure distribution of events in content-based publish subscribe systems
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
Journal of Parallel and Distributed Computing
Optimizing Rekeying Cost for Contributory Group Key Agreement Schemes
IEEE Transactions on Dependable and Secure Computing
Mind your manners: socially appropriate wireless key establishment for groups
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Key agreement in ad hoc networks
International Journal of Computational Science and Engineering
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks
International Journal of Distributed Sensor Networks - Sensor Networks, Ubiquitous and Trustworthy Computing
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
GAnGS: gather, authenticate 'n group securely
Proceedings of the 14th ACM international conference on Mobile computing and networking
Ternary Tree Based Group Key Management in Dynamic Peer Networks
Computational Intelligence and Security
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Lower bounds and new constructions on secure group communication schemes
Theoretical Computer Science
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
A conference key agreement protocol with fault-tolerant capability
Computer Standards & Interfaces
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
An efficient group key management scheme for mobile ad hoc networks
International Journal of Security and Networks
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks
Information Security and Cryptology --- ICISC 2008
SPATE: small-group PKI-less authenticated trust establishment
Proceedings of the 7th international conference on Mobile systems, applications, and services
Secure group communication in wireless mesh networks
Ad Hoc Networks
nPAKE+: a tree-based group password-authenticated key exchange protocol using different passwords
Journal of Computer Science and Technology
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
ID-Based Group Password-Authenticated Key Exchange
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks
WISM '09 Proceedings of the International Conference on Web Information Systems and Mining
The three-layered group key management architecture for MANET
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Design of efficient ternary-tree based group key agreement protocol for dynamic groups
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Key management scheme for multi-layer secure group communication
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
Usable key agreement in home networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
An efficient fault-tolerant group key agreement protocol
Computer Communications
Scalable group key management protocol based on key material transmitting tree
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Key agreement in ad hoc networks
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
A dynamic group key distribution scheme with flexible user join
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Efficient re-keying protocols for multicast encryption
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
ECGK: An efficient clustering scheme for group key management in MANETs
Computer Communications
On security models and compilers for group key exchange protocols
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
DLPKH - distributed logical public-key hierarchy
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Self-authorized public key management for home networks
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
nPAKE+: a hierarchical group password-authenticated key exchange protocol using different passwords
ICICS'07 Proceedings of the 9th international conference on Information and communications security
A novel group key management based on Jacobian Elliptic Chebyshev rational map
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
A visual way to talk to strangers: authentication in wireless pervasive computing
International Journal of Ad Hoc and Ubiquitous Computing
Key management scheme for multiple simultaneous secure group communication
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
A key management scheme for secure group communication using binomial key trees
International Journal of Network Management
A novel linear multi-secret sharing scheme for group communication in wireless mesh networks
Journal of Network and Computer Applications
Proxy encryption based secure multicast in wireless mesh networks
Journal of Network and Computer Applications
A lightweight group-key management protocol for secure ad-hoc-network routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic asymmetric group key agreement for ad hoc networks
Ad Hoc Networks
A novel group key agreement protocol for wireless mesh network
Computers and Electrical Engineering
Server-aided password-authenticated key exchange: from 3-party to group
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
An improved protocol for server-aided authenticated group key establishment
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
Identity-based trace and revoke schemes
ProvSec'11 Proceedings of the 5th international conference on Provable security
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
A simple group diffie-hellman key agreement protocol without member serialization
CIS'04 Proceedings of the First international conference on Computational and Information Science
From proxy encryption primitives to a deployable secure-mailing-list solution
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A secure p2p video conference system for enterprise environments
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Secure group communication with low communication complexity
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Cryptanalysis of two group key management protocols for secure multicast
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
An efficient hierarchical group key management protocol for a ubiquitous computing environment
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
A cluster-based group rekeying algorithm in mobile ad hoc networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Scalable group key management with partially trusted controllers
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient authenticated key agreement protocol for dynamic groups
WISA'04 Proceedings of the 5th international conference on Information Security Applications
A secure checkpointing protocol for survivable server design
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Practical and provably-secure multicasting over high-delay networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Pseudonym generation scheme for ad-hoc group communication based on IDH
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Secure multicast using proxy encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Fast algorithms for the free riders problem in broadcast encryption
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
An extension of secure group communication using key graph
Information Sciences: an International Journal
A new efficient fast routing protocol for MANET
AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics
Authenticated group key agreement for multicast
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Authenticated and communication efficient group key agreement for clustered ad hoc networks
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Constant-Round password-based group key generation for multi-layer ad-hoc networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy enhanced data outsourcing in the cloud
Journal of Network and Computer Applications
Authenticity check to provide trusted platform in MANET (ACTP)
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Property-testing real-world authorization systems
Proceedings of the 18th ACM symposium on Access control models and technologies
Secure group key management scheme based on dual receiver cryptosystem
Proceedings of the first ACM workshop on Asia public-key cryptography
Hi-index | 0.00 |