Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Scalable attribute-based group key establishment: from~passive to active and deniable 2014-10-02 Paper Scalable Deniable Group Key Establishment 2013-08-07...
    10 bytes (18 words) - 21:17, 11 December 2023
  • Publication Type Group Key Establishment in a Quantum-Future Scenario 2021-10-06 Paper Pitfalls in a server-aided authenticated group key establishment 2019-12-13...
    10 bytes (22 words) - 19:50, 12 December 2023
  • Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement 2015-12-02 Paper Provably secure threshold public-key encryption with...
    10 bytes (17 words) - 22:04, 11 December 2023
  • Password-authenticated group key establishment from smooth projective hash functions 2020-02-20 Paper Pitfalls in a server-aided authenticated group key establishment...
    10 bytes (20 words) - 23:54, 9 December 2023
  • Secure Group Key Agreement Building on Group Theory 2014-08-21 Paper Relations Among Privacy Notions 2010-01-07 Paper A Framework for Robust Group Key Agreement...
    10 bytes (18 words) - 09:43, 25 September 2023
  • et al.'s generic construction of a group key exchange protocol 2011-01-28 Paper Constant-Round Authenticated Group Key Exchange with Logarithmic Computation...
    10 bytes (17 words) - 01:00, 25 September 2023
  • Optimizing deletion cost for secure multicast key management 2008-07-31 Paper Optimal Tree Structures for Group Key Management with Batch Updates 2008-05-22...
    10 bytes (18 words) - 15:10, 12 December 2023
  • on a distributed group key exchange system 2018-01-15 Paper Group key management based on semigroup actions 2017-08-04 Paper Public key protocols over the...
    10 bytes (20 words) - 11:41, 11 December 2023
  • Optimal tree structures for group key tree management considering insertion and deletion cost 2009-07-10 Paper Optimal Key Tree Structure for Deleting...
    10 bytes (17 words) - 14:15, 11 December 2023
  • authenticated group key agreement from bilinear maps 2013-07-04 Paper Identity-based key distribution for mobile ad hoc networks 2013-07-04 Paper Group key agreement...
    10 bytes (16 words) - 03:18, 25 September 2023
  • on a Group Key Exchange Protocol for Mobile Networks 2011-06-30 Paper A security weakness in Abdalla et al.'s generic construction of a group key exchange...
    10 bytes (16 words) - 07:31, 7 October 2023
  • Generic One Round Group Key Exchange in the Standard Model 2010-07-16 Paper Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange 2010-07-16...
    10 bytes (17 words) - 13:01, 7 October 2023
  • Approximately optimal trees for group key management with batch updates 2009-03-20 Paper Optimizing deletion cost for secure multicast key management 2008-07-31...
    10 bytes (16 words) - 13:25, 6 October 2023
  • Publication Date of Publication Type Scalable Deniable Group Key Establishment 2013-08-07 Paper Two-party key establishment: From passive to active security without...
    10 bytes (16 words) - 05:49, 7 October 2023
  • Multiplications in Pairing Computations 2010-07-20 Paper Generic One Round Group Key Exchange in the Standard Model 2010-07-16 Paper Efficient Certificateless...
    10 bytes (21 words) - 08:45, 13 December 2023
  • Generic One Round Group Key Exchange in the Standard Model 2010-07-16 Paper Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols...
    10 bytes (18 words) - 03:11, 28 December 2023
  • ID-based authenticated dynamic group key agreement with optimal round 2013-08-20 Paper An efficient dynamic authenticated key exchange protocol with selectable...
    10 bytes (16 words) - 07:18, 7 October 2023
  • on a Group Key Exchange Protocol for Mobile Networks 2011-06-30 Paper A security weakness in Abdalla et al.'s generic construction of a group key exchange...
    10 bytes (16 words) - 07:31, 7 October 2023
  • 2014-10-02 Paper Deniable Group Key Agreement 2014-08-21 Paper Towards Provably Secure Group Key Agreement Building on Group Theory 2014-08-21 Paper On...
    10 bytes (16 words) - 01:27, 25 September 2023
  • Paper An application of group theory in confidential network communications 2018-04-25 Paper An active attack on a distributed group key exchange system 2018-01-15...
    10 bytes (17 words) - 19:51, 24 September 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)