Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik, “On the Performance of Group Key Agreement Protocols”, ACM Trans. Inf. Syst. Secur., vol. 7, no. 3, pp. 457-488, Aug. 2004.
    2. D. Augot, R. Bhaskar, V. Issarny and D. Sacchetti, “An Efficient Group Key Agreement Protocol for Ad Hoc Networks”, Proc. 6th IEEE Int’l Symp. on a World of Wireless Mobile and Multimedia Networks (WOWMOM 2005), pp. 576- 580, 2005.
    3. A. Beimel and B. Chor, “Communication in Key Distribution Schemes”, Proc. Advances in Cryptology (CRYPTO’93), vol. 773, pp. 444-455, 1994.
    4. R. Blom, “An Optimal Class of Symmetric Key Generation Systems”, Proc. Advances in CryptologyEUROCRYPT’84, vol. 209, pp. 335-338, 1984.
    5. D. Boneh and M. K. Franklin, “An Efficient Public-key Traitor Tracing Scheme”, Proc. Advances in Cryptology (CRYPTO’99), vol. 1666, pp. 338- 353, 1999.
    6. D. Boneh, C. Gentry and B. Waters, “Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys”, Proc. Advances in Cryptology (CRYPTO’05), vol. 3621, pp. 258-275, 2005.
    7. D. Boneh, A. Sahai and B. Waters, “Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys”, Proc. 25th Int’l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT’06), vol. 4004, pp. 573-592, 2006.
    8. D. Boneh and M. Naor, “Traitor Tracing with Constant Size Ciphertext”, Proc. 15th ACM Conf. Computer and Comm. Security, pp. 501-510, 2008.
    9. D. Boneh and A. Silverberg, “Applications of Multilinear Forms to Cryptography”, Contemporary Mathematics, Vol. 324, American Mathematical Society, pp. 71-90, 2003.
    10. C. Blundo, L. A. Mattos and D. R. Stinson, “Generalized Beimel- Chor Schemes for Broadcast Encryption and Interactive Key Distribution”, Theor. Comp. Sci., vol. 200, no. 1-2, pp. 313-334, 1998.
    11. C. Blundo and A. Cresti, “Space Requirements for Broadcast Encryption”, Proc. Advances in Cryptology - EUROCRYPT 1994, vol. 950, pp. 287- 298, 1995.
    12. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro and M. Yung, “Perfectly Secure Key Distribution for Dynamic Conferences”, Inf. Comput., vol. 146, no. 1, pp. 1-23, 1998.
    13. C. Boyd and J. M. Gonz´alez-Nieto, “RoundOptimal Contributory Conference Key Agreement”, Proc. Public Key Cryptography (PKC’03), vol. 2567, pp. 161-174, 2003.
    14. E. Bresson, O. Chevassut and D. Pointcheval, “Provably Authenticated Group Diffie-Hellman Key Exchange The Dynamic Case”, Proc. 7th Int’l Conf. Theory and Application of Cryptology and Information Security (ASIACRYPT’01), vol. 2248, pp. 290-309, 2001.
    15. E. Bresson, O. Chevassut and D. Pointcheval, “Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions”, Proc. 21th Int’l Conf Theory and Application of Cryptographic Techniques (Eurocrypt’02), vol. 2332, pp. 321-336, 2002.

Recent Article