On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Some New Results on Key Distribution Patterns and BroadcastEncryption
Designs, Codes and Cryptography
Anonymous authentication with subset queries (extended abstract)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Linear Key Predistribution Schemes
Designs, Codes and Cryptography
On the cardinality of intersection sets in inversive planes
Journal of Combinatorial Theory Series A
Linear broadcast encryption schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Broadcast encryption with short keys and transmissions
Proceedings of the 3rd ACM workshop on Digital rights management
Asymptotic Upper Bound for the Rate of (w, r) Cover-Free Codes
Problems of Information Transmission
Key Distribution Patterns Using Tangent Circle Structures
Designs, Codes and Cryptography
On a Bound of Cover-Free Families
Designs, Codes and Cryptography
On the Optimality of Trivial (w, r)-Cover-Free Codes
Problems of Information Transmission
Self-organised group key management for ad hoc networks
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Unconditionally secure ring authentication
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A unified model for unconditionally secure key distribution
Journal of Computer Security
A canonical seed assignment model for key predistribution in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Uniqueness of some optimal superimposed codes
Problems of Information Transmission
Secure collaborations over message boards
International Journal of Security and Networks
Non-interactive conference key distribution and its applications
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Asymptotic bounds for the rate of colored superimposed codes
Problems of Information Transmission
On the construction of (w, r) cover-free codes
Problems of Information Transmission
On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
Asymmetric key pre-distribution scheme for sensor networks
IEEE Transactions on Wireless Communications
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
A dynamic group key distribution scheme with flexible user join
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A group key distribution scheme with decentralised user join
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Shared generation of pseudo-random functions with cumulative maps
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
The subset keys and identity tickets (SKIT) key distribution scheme
IEEE Transactions on Information Forensics and Security
Group testing and batch verification
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
The rise and fall and rise of combinatorial key predistribution
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Radio networks with reliable communication
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
Security of emergent properties in ad-hoc networks (transcript of discussion)
SP'04 Proceedings of the 12th international conference on Security Protocols
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
Tree-Based key distribution patterns
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Threshold and majority group testing
Information Theory, Combinatorics, and Search Theory
Hi-index | 0.05 |