Author:
Di Crescenzo Giovanni,Kornievskaia Olga
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. K. Becker and U. Wille. Communication complexity of group key distribution. In Proceedings ofthe 5th ACM Conference on Computer and Communication Security, pages 1–6, San Francisco, CA, November 1998.
2. R. Canetti, J. Garay, G. Itkis, D. Miccianco, M. Naor, and B. Pinkas. Multicast security: A taxonomy and efficient authentication. In IEEE INFOCOMM, 1999.
3. Lect Notes Comput Sci;R. Canetti,1999
4. W. Diffie and M. Hellman. New directions in cryptography. IEEE Transaction on Information Theory, 22:644–654, November 1976.
5. M. Hur, B. Tung, T. Ryutov, C. Neuman, A. Medvinsky, G. Tsudik, and B. Sommerfeld. Public key cryptography for cross-realm authentication in kerberos, May 2001. Internet draft.
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献