Author:
Micciancio Daniele,Panjwani Saurabh
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Lecture Notes in Computer Science;R. Zhang,2005
2. Abadi, M., Warinschi, B.: Security analysis of cryptographically controlled access to XML documents. In: Proc. of 24th ACM Symposium on Principles of Database Systems (PODS), pp. 108–117 (2005)
3. Bellare, M., Yee, B.: Forward security in private key cryptography. In: Topics in Cryptology – CT-RSA, pp. 1–18 (2003)
4. Canetti, R., Garay, J.A., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: IEEE INFOCOM 1999, pp. 708–716 (1999)
5. Chang, I., Engel, R., Kandlur, D., Pendarakis, D., Saha, D.: Key management for secure internet multicast using boolean function minimization techniques. In: IEEE INFOCOMM 1999, pp. 689–698 (1999)
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献