Author:
Nam Junghyun,Cho Seokhyang,Kim Seungjoo,Won Dongho
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the Performance of Group Key Agreement Protocols. In: Proc. 22nd IEEE International Conference on Distributed Computing Systems, pp. 463–464 (2002), Full version available at
http://www.cnds.jhu.edu/publications/
2. Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18(4), 628–639 (2000)
3. Becker, K., Wille, U.: Communication complexity of group key distribution. In: Proc. 5th ACM Conf. on Computer and Communications Security (CCS 1998), pp. 1–6 (1998)
4. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. 1st ACM Conf. on Computer and Communications Security (CCS 1993), pp. 62–73 (1993)
5. Biham, E., Boneh, D., Reingold, O.: Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Information Processing Letters (IPL) 70(2), 83–87 (1999)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献