Author:
Lee Patrick P.C.,Lui John C.S.,Yau David K.Y.
Subject
Hardware and Architecture,Information Systems,Software
Reference27 articles.
1. Amir, Y., Danilov, C., Miskin-Amir, M., Schultz, J., Stanton, J., 2004a. The Spread Toolkit: architecture and performance. CNDS-2004-1, Johns Hopkins University.
2. Secure group communication using robust contributory key agreement;Amir;IEEE Transactions on Parallel and Distributed Systems,2004
3. Ateniese, G., Steiner, M., Tsudik, G., 1998. Authenticated group key agreement and friends. In: Proceedings of the 5th ACM Conference on Computer and Communications Security, November, pp. 17–26.
4. Burmester, M., Desmedt, Y., 1995, A secure and efficient conference key distribution system. In: Advances in Cryptology – EUROCRYPT’94 950, pp. 275–286.
5. New directions in cryptography;Diffie;IEEE Transactions on Information Theory,1976
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Distributed Computing in the Metaverse: A Balanced TGDH Encryption Scheme;2023 IEEE International Conference on Metaverse Computing, Networking and Applications (MetaCom);2023-06
2. A Survey on Group Key Agreement Protocols in Cloud Environment;2018 1st International Cognitive Cities Conference (IC3);2018-08
3. Secure Group Key Agreement Protocols;Algorithmic Strategies for Solving Complex Problems in Cryptography;2018
4. Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication;Mobile Networks and Applications;2015-09-12
5. A Group Key Agreement Scheme Revisited;2008 The Fourth International Conference on Information Assurance and Security;2008-09