Author:
Kausar Firdous,Hussain Sajid,Park Jong Hyuk,Masood Ashraf
Publisher
Springer Berlin Heidelberg
Reference23 articles.
1. Wallner, D., Harder, E., Agee, R.: Key management for multicast: Issues and architectures (1999)
2. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast Security: A Taxonomy and Some Efficient Constructions. In: INFOCOMM 1999 (1999)
3. Kurnio, H., Safavi-Naini, R., Wang, H.: A secure re-keying scheme with key recovery property. In: Proceedings of the 7th Australian Conference on Information Security and Privacy, pp. 40–55. Springer, London, UK (2002)
4. Wang, L., Wu, C.K.: Authenticated group key agreement for multicast. In: The 5th International Conference on Cryptology and Network Security, Springer, Heidelberg (2006)
5. Lecture Notes in Computer Science;J.H. Ki,2003
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献