Cryptography Reference
In-Depth Information
References
1. AACS Specifications, 2006. http://www.aacsla.com/specifications/.
2. M. Abdalla, D. Pointcheval, P.-A. Fouque, and D. Vergnaud, editors. Ap-
plied Cryptography and Network Security, 7th International Conference, ACNS
2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, volume 5536
of Lecture Notes in Computer Science, 2009.
3. M. Abdalla, Y. Shavitt, and A. Wool. Key management for restricted multicast
using broadcast encryption. IEEE/ACM Trans. Netw., 8(4):443-454, 2000.
4. W. Aiello, S. Lodha, and R. Ostrovsky. Fast digital identity revocation (ex-
tended abstract). In H. Krawczyk, editor, CRYPTO, volume 1462 of Lecture
Notes in Computer Science, pages 137-152. Springer, 1998.
5. M. Ak, K. Kaya, and A. A. Selcuk. Optimal subset-difference broadcast en-
cryption with free riders. Information Sciences, 2009.
6. N. Attrapadung and H. Imai. Graph-decomposition-based frameworks for
subset-cover broadcast encryption and e cient instantiations. In B. K. Roy, ed-
itor, ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, pages
100-120. Springer, 2005.
7. L. M. Batten and X. Yi. E cient broadcast key distribution with dynamic
revocation. Security and Communication Networks, 1(4):351-362, 2008.
8. M. Bellare, editor. Advances in Cryptology - CRYPTO 2000, 20th Annual
International Cryptology Conference, Santa Barbara, California, USA, August
20-24, 2000, Proceedings, volume 1880 of Lecture Notes in Computer Science.
Springer, 2000.
9. O. Berkman, M. Parnas, and J. Sgall. E cient dynamic traitor tracing. In
SODA, pages 586-595, 2000.
10. S. Berkovits. How to broadcast a secret. In EUROCRYPT, pages 535-541,
1991.
11. E. R. Berlekamp and L. Welch. Error correction of algebraic block codes. U.S.
Patent, Number 4,633,470, 1986.
12. I. Biehl and B. Meyer. Protocols for collusion-secure asymmetric fingerprinting
(extended abstract). In R. Reischuk and M. Morvan, editors, STACS, volume
1200 of Lecture Notes in Computer Science, pages 399-412. Springer, 1997.
13. O. Billet and D. H. Phan. E cient traitor tracing from collusion secure codes.
In R. Safavi-Naini, editor, ICITS, volume 5155 of Lecture Notes in Computer
Science, pages 171-182. Springer, 2008.
 
 
Search WWH ::




Custom Search