|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 18 keywords
|
|
|
Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
103 | Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu |
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 357-371, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TGDH, Bilinear Diffie-Hellman, Pairings, Bilinear map, Group key agreement |
94 | Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang |
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 540-544, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ellipse curve, bilinear pairing, group key agreement, secure group communication |
47 | Shengke Zeng, Mingxing He, Weidong Luo |
New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 746-751, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dynamic Peer Group, Provable Security, Key Agreement, Random Oracle Model, ID-Based Signature |
47 | Sunghyuck Hong, Noé Lopez-Benitez |
Enhanced Group Key Generation Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Yongdae Kim, Adrian Perrig, Gene Tsudik |
Tree-based group key agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 60-96, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, group communication, cryptographic protocols, communication complexity, group key agreement |
47 | S. Rahul, R. C. Hansdah |
An Efficient Distributed Group Key Management Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 10th International Conference on Parallel and Distributed Systems, ICPADS 2004, Newport Beach, CA, USA, July 7-9, 2004, pp. 230-, 2004, IEEE Computer Society, 0-7695-2152-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Anway Bose, John L. Nori, Li Bai |
Securing Distributed Computing in the Metaverse: A Balanced TGDH Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MetaCom ![In: IEEE International Conference on Metaverse Computing, Networking and Applications, MetaCom 2023, Kyoto, Japan, June 26-28, 2023, pp. 226-233, 2023, IEEE, 979-8-3503-3333-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
37 | Vaishali R. Thakare, John Singh K |
An efficient ternary tree-based TGDH protocol for dynamic secure group data sharing in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Embed. Syst. ![In: Int. J. Embed. Syst. 10(4), pp. 273-286, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | István Lám, Szilveszter Szebeni, Levente Buttyán |
Invitation-Oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 41st International Conference on Parallel Processing Workshops, ICPPW 2012, Pittsburgh, PA, USA, September 10-13, 2012, pp. 269-276, 2012, IEEE Computer Society, 978-1-4673-2509-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
37 | Maria Striki, John S. Baras, Kyriakos Manousakis |
A Robust, Distributed TGDH-based Scheme for Secure Group Communications in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006, pp. 2249-2255, 2006, IEEE, 1-4244-0355-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Xukai Zou, Byrav Ramamurthy |
A block-free TGDH key agreement protocol for secure group communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Parallel and Distributed Computing and Networks ![In: Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, Innsbruck, Austria, February 17-19, 2004, pp. 288-293, 2004, IASTED/ACTA Press. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
33 | Krishnan Kumar, J. Nafeesa Begum, V. Sumathy |
A Novel Approach towards Cost Effective Region-Based Group Key Agreement Protocol for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CICSyN ![In: First International Conference on Computational Intelligence, Communication Systems and Networks, CICSYN 2009, Indore, India, 23-25 July, 2009, pp. 470-475, 2009, IEEE Computer Society, 978-0-7695-3743-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CRTDH, TGDH, Ad hoc networks, Group key agreement |
23 | Andreas Sjöholm, Ludwig Seitz, Babak Sadighi |
Secure communication for ad-hoc, federated groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 48-58, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
tree-based group, access control, authorization, XACML, secure group communication, Diffie-Hellman |
23 | Mark Manulis, Jörg Schwenk |
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security in Ad-hoc and Sensor Networks, First European Workshop, ESAS 2004, Heidelberg, Germany, August 6, 2004, Revised Selected Papers, pp. 107-124, 2004, Springer, 3-540-24396-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #14 of 14 (100 per page; Change: )
|
|