Multicast routing in internetworks and extended LANs
SIGCOMM '88 Symposium proceedings on Communications architectures and protocols
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
The art of computer programming, volume 1 (3rd ed.): fundamental algorithms
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
The mWeb presentation framework
Selected papers from the sixth international conference on World Wide Web
WebCanal: a multicast Web application
Selected papers from the sixth international conference on World Wide Web
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
Multicast-specific security threats and counter-measures
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Reliable group rekeying: a performance analysis
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Network Security in the Multicast Framework
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Network security in the multicast framework
Advanced lectures on networking
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Protocol design for scalable and reliable group rekeying
IEEE/ACM Transactions on Networking (TON)
Group rekeying with limited unicast recovery
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable and lightweight key distribution for secure group communications
International Journal of Network Management
LiSP: A lightweight security protocol for wireless sensor networks
ACM Transactions on Embedded Computing Systems (TECS)
A Novel High-Order Tree for Secure Multicast Key Management
IEEE Transactions on Computers
A middleware service for secure group communication in mobile ad hoc networks
Journal of Systems and Software - Special issue: Computer software & applications
On the security of group communication schemes based on symmetric key cryptosystems
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Key bundles and parcels: secure communication in many groups
Computer Networks: The International Journal of Computer and Telecommunications Networking
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
Distributed collaborative key agreement and authentication protocols for dynamic peer groups
IEEE/ACM Transactions on Networking (TON)
SEAL: A secure communication library for building dynamic group key agreement applications
Journal of Systems and Software
Computer Networks: The International Journal of Computer and Telecommunications Networking
Dynamic Balanced Key Tree Management for Secure Multicast Communications
IEEE Transactions on Computers
Performance optimization of region-based group key management in mobile ad hoc networks
Performance Evaluation
A scalable group-rekeying scheme using secret mask patterns
International Journal of High Performance Computing and Networking
On the security of group communication schemes
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Optimizing deletion cost for secure multicast key management
Theoretical Computer Science
Optimal Tree Structures for Group Key Tree Management Considering Insertion and Deletion Cost
COCOON '08 Proceedings of the 14th annual international conference on Computing and Combinatorics
Effective Key Management Protocol for Extremely Self-Motivated Environment
Information Systems Management
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Approximately optimal trees for group key management with batch updates
Theoretical Computer Science
Optimal tree structures for group key tree management considering insertion and deletion cost
Theoretical Computer Science
Proactive key management protocol for multicast services
CFI '09 Proceedings of the 4th International Conference on Future Internet Technologies
Secure group communication in wireless mesh networks
Ad Hoc Networks
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
Wireless Personal Communications: An International Journal
Approximately optimal trees for group key management with batch updates
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Multigroup rekeying for a wireless network
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
Scalable and efficient approach for secure group communication
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
An efficient key management scheme for live streaming
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
DAKS: an efficient batch rekeying scheme for departure-aware multicast services
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An optimal key distribution scheme for secure multicast group communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
Multicast support for collaborative networking
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
On design tradeoffs between security and performance in wireless group communicating systems
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Optimal tree structure for key management of simultaneous join/leave in secure multicast
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
A benchmarking environment for performance evaluation of tree-based rekeying algorithms
Journal of Systems and Software
Wireless Personal Communications: An International Journal
Non-split balancing higher order tree for multi-privileged groups
WSEAS TRANSACTIONS on COMMUNICATIONS
Optimal tree structure with loyal users and batch updates
Journal of Combinatorial Optimization
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
Performance analysis of batch rekey algorithm for secure group communications
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
How to construct multicast cryptosystems provably secure against adaptive chosen ciphertext attack
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Topology-Aware key management scheme for secure overlay multicast
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
An extension of secure group communication using key graph
Information Sciences: an International Journal
Balanced key tree management for multi-privileged groups using (N, T) policy
Security and Communication Networks
Optimal key tree structure for two-user replacement and deletion problems
Journal of Combinatorial Optimization
Hardware security platform for multicast communications
Journal of Systems Architecture: the EUROMICRO Journal
Secure group re-keying using key inverses
Journal of High Speed Networks
Hi-index | 0.01 |