Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
86 | Lie Liu, Chun Yuan |
Trace and revoke systems with short ciphertexts. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
revoke, trace, broadcast encryption, ciphertext |
83 | Aggelos Kiayias, Serdar Pehlivanoglu |
Pirate Evolution: How to Make the Most of Your Traitor Keys. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
83 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
Authorizations in Relational Database Management Systems. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
81 | Sukhamay Kundu |
Deadlock-Free Distributed Relaxed Mutual-Exclusion Without Revoke-Messages. |
IWDC |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Hongxia Jin, Jeffery Lotspiech |
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
anti-piracy, broadcast encryption, traitor tracing, Content protection |
54 | Dan Boneh, Brent Waters |
A fully collusion resistant broadcast, trace, and revoke system. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
|
54 | Yevgeniy Dodis, Nelly Fazio |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
54 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. |
Financial Cryptography |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
41 | Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee |
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Wynand van Staden, Martin S. Olivier |
SQL's revoke with a view on privacy. |
SAICSIT |
2007 |
DBLP DOI BibTeX RDF |
compound purposes, purpose binding, privacy, access control, SQL |
40 | Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee |
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Kenneth B. Russell, David Detlefs |
Eliminating synchronization-related atomic operations with biased locking and bulk rebiasing. |
OOPSLA |
2006 |
DBLP DOI BibTeX RDF |
rebias, revoke, Java, optimization, synchronization, monitor, atomic, lock, bias, reservation |
28 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
PEREA: towards practical TTP-free revocation in anonymous authentication. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication |
28 | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu 0001, Willy Susilo, Duncan S. Wong |
Revocable Ring Signature. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocability, ring signature |
28 | Feng Bao 0001, Robert H. Deng |
A New type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
e-commerce, traceability, blinding signatures, anonymity revocation |
26 | Fucai Luo, Haiyan Wang 0009, Willy Susilo, Xingfu Yan, Xiaofan Zheng |
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. |
IEEE Trans. Inf. Forensics Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Juexiao Zhou, Haoyang Li, Xingyu Liao, Bin Zhang 0042, Wenjia He, Zhongxiao Li, Longxi Zhou, Xin Gao 0001 |
Audit to Forget: A Unified Method to Revoke Patients' Private Data in Intelligent Healthcare. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Qiuwei Zheng, Jun Zhao |
Trace-and-Revoke Quadratic Functional Encryption. |
ISC |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Fariza Sabrina, Tony Sahama, Md. Mamunur Rashid 0001, Steven Gordon |
Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health Records. |
ACSW |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada 0001 |
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness. |
EUROCRYPT (3) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang 0009, Xingfu Yan |
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
26 | Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada 0001 |
Trace and Revoke with Optimal Parameters from Polynomial Hardness. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
26 | Ji Luo 0002 |
Ad Hoc (Decentralized) Broadcast, Trace, and Revoke. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
26 | Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé |
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
26 | Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang 0009, Weihong Han |
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. |
ESORICS (1) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Chien-Hung Liu, Chen-Tzung Liu, Hsiu-Hao Li |
Detecting Permission Crashes of Android Apps using Crawling and Revoke Operation Injections. |
APSEC Workshops |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé |
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. |
ACISP |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida |
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security. |
ISPEC |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Xuan Thanh Do, Duong Hieu Phan, Moti Yung |
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
26 | Xuan Thanh Do, Duong Hieu Phan, Moti Yung |
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. |
ACNS (2) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Trevor Smith, Luke Dickenson, Kent E. Seamons |
Let's Revoke: Scalable Global Certificate Revocation. |
NDSS |
2020 |
DBLP BibTeX RDF |
|
26 | Sam Kim, David J. Wu 0001 |
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. |
ASIACRYPT (2) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Sam Kim, David J. Wu 0001 |
Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
26 | Tobias Mueller, Marius Stübs, Hannes Federrath |
Let's Revoke! Mitigating Revocation Equivocation by re-purposing the Certificate Transparency Log. |
Open Identity Summit |
2019 |
DBLP BibTeX RDF |
|
26 | Mriganka Mandal, Ratna Dutta |
Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast Decryption. |
Inscrypt |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Mehrnoosh Shakarami, Ravi S. Sandhu |
Refresh Instead of Revoke Enhances Safety and Availability: A Formal Analysis. |
DBSec |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Mriganka Mandal, Ratna Dutta |
Efficient Adaptively Secure Public-Key Trace and Revoke from Subset Cover Using Déjà Q Framework. |
Inscrypt |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada 0001 |
Efficient Public Trace and Revoke from Standard Assumptions. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
26 | Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada 0001 |
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. |
CCS |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Willy Susilo, Rongmao Chen, Fuchun Guo, Guomin Yang, Yi Mu 0001, Yang-Wai Chow |
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext. |
AsiaCCS |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Murat Ak, Serdar Pehlivanoglu, Ali Aydin Selçuk |
Anonymous trace and revoke. |
J. Comput. Appl. Math. |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Dennis Hofheinz, Christoph Striecks |
A Generic View on Trace-and-Revoke Broadcast Encryption Schemes. |
CT-RSA |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Hung Q. Ngo 0001, Duong Hieu Phan, David Pointcheval |
Black-Box Trace&Revoke Codes. |
Algorithmica |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Dennis Hofheinz, Christoph Striecks |
A generic view on trace-and-revoke broadcast encryption schemes. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
26 | Duong Hieu Phan, Viet Cuong Trinh |
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. |
AFRICACRYPT |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Xingwen Zhao |
Amendment to Trace and Revoke Systems with Short Ciphertexts. |
Int. J. Netw. Secur. |
2012 |
DBLP BibTeX RDF |
|
26 | Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydin Selçuk |
Generic Construction of Trace and Revoke Schemes. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
26 | Véronique Cortier, Graham Steel, Cyrille Wiedling |
Revoke and let live: a secure key revocation api for cryptographic devices. |
CCS |
2012 |
DBLP DOI BibTeX RDF |
|
26 | |
Cascade Revoke. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Pierangela Samarati |
Recursive Revoke. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Jong Hwan Park, Hyun Sook Rhee, Dong Hoon Lee 0001 |
Fully collusion-resistant trace-and-revoke scheme in prime-order groups. |
J. Commun. Networks |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Duong Hieu Phan, Viet Cuong Trinh |
Identity-Based Trace and Revoke Schemes. |
ProvSec |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Moni Naor, Benny Pinkas |
Efficient trace and revoke schemes. |
Int. J. Inf. Sec. |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Hassan M. Elkamchouchi, Yasmine Abouelseoud |
A scalable trace and revoke scheme with security enhancements. |
CCNC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Dan Boneh, Brent Waters |
A Fully Collusion Resistant Broadcast, Trace, and Revoke System. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
26 | Dalit Naor, Moni Naor |
Protecting Cryptographic Keys: The Trace-and-Revoke Approach. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Yevgeniy Dodis, Nelly Fazio |
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. |
IACR Cryptol. ePrint Arch. |
2003 |
DBLP BibTeX RDF |
|
26 | Arnon Rosenthal, Edward Sciore |
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Shucheng Yu, Cong Wang 0001, Kui Ren 0001, Wenjing Lou |
Attribute based data sharing with attribute revocation. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
revocation, attribute based encryption, proxy re-encryption |
14 | Steffen Reidt, Mudhakar Srivatsa, Shane Balfe |
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
bees, partially available, suicide, trust authority, game, incentive, revocation, reward |
14 | Florin Constantin, Jon Feldman, S. Muthukrishnan 0001, Martin Pál |
An online mechanism for ad slot reservations with cancellations. |
SODA |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jun-Won Ho |
Zone-Based Trust Management in Sensor Networks. |
PerCom |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das 0001 |
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Stefan Katzenbeisser 0001, Klaus Kursawe, Frederic Stumpf |
Revocation of TPM Keys. |
TRUST |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Luis Carlos Coronado García, Carlos Hernández-López, Carlos Pérez Leguízamo |
Autonomous Decentralized Root Certification Authority System. |
ICDCS Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Daisuke Mashima, Mustaque Ahamad, Swagath Kannan |
User-Centric Handling of Identity Agent Compromise. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Alper Kanak, Ibrahim Sogukpinar |
Classification Based Revocable Biometric Identity Code Generation. |
COST 2101/2102 Conference |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch 0001, Arjan Kuijper |
A Security Analysis of Biometric Template Protection Schemes. |
ICIAR |
2009 |
DBLP DOI BibTeX RDF |
Biometric encryption, biometric template protection, correlation, attacks, security analysis |
14 | Katharine Chang, Kang G. Shin |
Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Distributed authentication, node revocation, program integrity verification, wireless sensor networks |
14 | Alexandra Boldyreva, Vipul Goyal, Virendra Kumar |
Identity-based encryption with efficient revocation. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
provable security, revocation, identity-based encryption |
14 | Kenneth P. Laberteaux, Jason J. Haas, Yih-Chun Hu |
Security certificate revocation list distribution for vanet. |
Vehicular Ad Hoc Networks |
2008 |
DBLP DOI BibTeX RDF |
security, simulation, vanet, revocation, crl |
14 | Linchun Li, Jianhua Li 0001, Yue Wu 0010, Ping Yi |
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
loss tolerance, authentication, revocation, group key management, node compromise |
14 | Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai |
Ternary Subset Difference Method and Its Quantitative Analysis. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Subset Difference Method, Ternary Tree, Broadcast Encryption |
14 | Shinsaku Kiyomoto, Toshiaki Tanaka |
Anonymous attribute authentication scheme using self-blindable certificates. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
14 | David Lubicz, Thomas Sirvent |
Attribute-Based Broadcast Encryption Scheme Made Efficient. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption |
14 | Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa 0001 |
Making Societies in Peer-to-Peer (P2P) Overlay Networks. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, information security |
14 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Pirate decoder for the broadcast encryption schemes from Crypto 2005. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
pirate decoder, broadcast encryption, traitor tracing |
14 | Ulrich Kühn 0001, Marcel Selhorst, Christian Stüble |
Realizing property-based attestation and sealing with commonly available hard- and software. |
STC |
2007 |
DBLP DOI BibTeX RDF |
property-based attestation, property-based sealing, trusted computing |
14 | Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith |
Blacklistable anonymous credentials: blocking misbehaving users without ttps. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
anonymous blacklisting, user misbehavior, privacy, revocation, anonymous authentication |
14 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
14 | Ernie Brickell, Jiangtao Li 0001 |
Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
privacy, anonymity, cryptographic protocols, trusted computing |
14 | Cécile Delerablée, Pascal Paillier, David Pointcheval |
Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Philip Zigoris, Hongxia Jin |
Bayesian Methods for Practical Traitor Tracing. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Heath A. James, Kenneth A. Hawick, Chris Scogings |
User-friendly scheduling tools for large-scale simulation experiments. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang |
A proxy blind signature scheme based on elliptic curve with proxy revocation. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Sébastien Canard, Aline Gouget |
Divisible E-Cash Systems Can Be Truly Anonymous. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Chun-I Fan, Vincent Shi-Ming Huang |
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication |
14 | Yawen Wei, Zhen Yu, Yong Guan |
Location Verification Algorithms forWireless Sensor Networks. |
ICDCS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ratna Dutta, Sourav Mukhopadhyay |
Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, self-healing, revocation, rekeying |
14 | Dmitrij Lagutin, Hannu H. Kari |
Controlling Incoming Connections Using Certificates and Distributed Hash Tables. |
NEW2AN |
2007 |
DBLP DOI BibTeX RDF |
rights delegation, DoS countermeasures, certificates, Session management, rights management |
14 | Noam Kogan, Tamir Tassa |
Improved efficiency for revocation schemes via Newton interpolation. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Newton interpolation, secret sharing, broadcast encryption, User revocation |
14 | Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich |
How to win the clonewars: efficient periodic n-times anonymous authentication. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
n-anonymous authentication, credentials, clone detection |
14 | Martin Schaffer, Peter Schartner |
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Joachim Biskup, Joerg Parthe |
Optimistic Anonymous Participation in Inter-organizational Workflow Instances. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Man Ho Au, Willy Susilo, Siu-Ming Yiu |
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Arvind Seshadri, Mark Luk, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
SCUBA: Secure Code Update By Attestation in sensor networks. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
externally-verifiable code execution, secure code update, self-checksumming code, software-based attestation |
14 | Ling Dong, Kefei Chen |
A Practical Clumped-Tree Multicast Encryption Scheme. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Constant-Size Dynamic k-TAA. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|