Author:
Hee Ki Ju,Jeong Kim Hyun,Hoon Lee Dong,Seop Park Chang
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. R. Canett, J. Garay, G. Itkis, K. Micciancio, M. Naor, and B. Pinkas.multicast Security:A Taxonom and Some Efficient construcions. In Proc,of INFOCOM 99, 1999. 498
2. G. Caronni, M. Waldvogel, D. Sunand, and B. Plattner. Efficient Securit for Large and Dynamic Multicast Groups. In Workshop on Enabling Technologies, (WETICE 98). IEEE Comp Society Press, 1998. 498,507
3. I. Chang, R. Engel, D. Kandlur, D. Pendarakis, and K. Saha. Key Management for Secure Internet Multicast Using Boolean Function Minimization Techniqueis. In IEEE NFOCOM, March 1999. 498
4. M. Karnaugh. The Map Method for Sysnthesis of Combinational Logic Circuits., Transact ons AIEE,Commun cat ons and Electronics, Vol. 72, pp. 593–599, November 1953.498
5. Technical Report;D.A. McGrew,1998
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献