Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
Scalable multicast security with dynamic recipient groups
ACM Transactions on Information and System Security (TISSEC)
Group security association (GSA) management in IP multicast
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Network Security in the Multicast Framework
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Efficient State Updates for Key Management
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Network security in the multicast framework
Advanced lectures on networking
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Efficient self-healing group key distribution with revocation capability
Proceedings of the 10th ACM conference on Computer and communications security
Group rekeying with limited unicast recovery
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Implications of Pervasive Computing on Network Design
BT Technology Journal
A key-chain-based keying scheme for many-to-many secure group communication
ACM Transactions on Information and System Security (TISSEC)
Gossip-based scalable and reliable group key distribution framework
InfoSecu '04 Proceedings of the 3rd international conference on Information security
A group key recovery mechanism based on logical key hierarchy
Journal of Computer Security
Key distribution and update for secure inter-group multicast communication
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
A practical revocation scheme for broadcast encryption using smartcards
ACM Transactions on Information and System Security (TISSEC)
Algorithms for dynamic multicast key distribution
Journal of Experimental Algorithmics (JEA)
Key management for content access control in a hierarchy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Adaptive clustering for scalable key management in dynamic group communications
International Journal of Security and Networks
Distributed key management for dynamic groups in MANETs
Pervasive and Mobile Computing
KCT-Based Group Key Management Scheme in Clustered Wireless Sensor Networks
ICESS '07 Proceedings of the 3rd international conference on Embedded Software and Systems
Group key management in wireless mesh networks
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Scalable key management algorithms for location-based services
IEEE/ACM Transactions on Networking (TON)
Secure multicast in IPTV services
Computer Networks: The International Journal of Computer and Telecommunications Networking
DAKS: an efficient batch rekeying scheme for departure-aware multicast services
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Dynamic rekeying in 3GPP multimedia broadcast/multicast service (MBMS)
IEEE Communications Letters
Optimizing the batch mode of group rekeying: lower bound and new protocols
INFOCOM'10 Proceedings of the 29th conference on Information communications
Applying time-bound hierarchical key assignment in wireless sensor networks
ICICS'11 Proceedings of the 13th international conference on Information and communications security
An enhanced one way function tree rekey protocol based on chinese remainder theorem
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
A novel batch rekeying processor architecture for secure multicast key management
HiPEAC'05 Proceedings of the First international conference on High Performance Embedded Architectures and Compilers
Towards end-to-end secure content storage and delivery with public cloud
Proceedings of the second ACM conference on Data and Application Security and Privacy
An efficient key management scheme for content access control for linear hierarchies
Computer Networks: The International Journal of Computer and Telecommunications Networking
Incorporating temporal capabilities in existing key management schemes
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Towards secure and communication-efficient broadcast encryption systems
Journal of Network and Computer Applications
Hi-index | 0.00 |