Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2023
- Eman Talib Alghareeb, Valeriy O. Osipyan:
User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol. Informatica (Slovenia) 47(5) (2023) - Julia Bobrysheva, Sergey Zapechnikov:
Post-quantum security of messengers: secure group chats and continuous key distribution protocols. J. Comput. Virol. Hacking Tech. 19(3): 373-380 (2023) - 2022
- Hongfeng Zhu, Zhiqin Du, Liwei Wang, Yuanle Zhang:
A N-party authenticated group key distribution protocol using quantum-reflection architecture. Int. J. Inf. Comput. Secur. 19(3/4): 237-253 (2022) - 2021
- Hüsnü Yildiz, Murat Cenk, Ertan Onur:
PLGAKD: A PUF-Based Lightweight Group Authentication and Key Distribution Protocol. IEEE Internet Things J. 8(7): 5682-5696 (2021) - M. Ragunathan, T. Kathirvalavakumar, Rajendra Prasath:
Enhanced Group Key Distribution Protocol for Intra Group and Inter Group Communication Using Access Control Polynomial. MIKE 2021: 225-232 - Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas:
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones. NordSec 2021: 31-48 - Eugene Frimpong, Reyhaneh Rabbaninejad, Antonis Michalas:
Arrows in a Quiver: A Secure Certificateless Group Key Distribution Protocol for Drones. IACR Cryptol. ePrint Arch. 2021: 1372 (2021) - 2020
- Hüsnü Yildiz:
A PUF-based lightweight group authentication and key distribution protocol ; -. Middle East Technical University, Çankaya, Ankara, Turkey, 2020 - Guangquan Xu, Xiaotong Li, Litao Jiao, Weizhe Wang, Ao Liu, Chunhua Su, Xi Zheng, Shaoying Liu, Xiaochun Cheng:
BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs. IEEE Commun. Mag. 58(7): 35-41 (2020) - Vinod Kumar, Rajendra Kumar, Santosh K. Pandey:
A secure and robust group key distribution and authentication protocol with efficient rekey mechanism for dynamic access control in secure group communications. Int. J. Commun. Syst. 33(14) (2020) - Vinod Kumar, Rajendra Kumar, Santosh K. Pandey:
A computationally efficient centralized group key distribution protocol for secure multicast communications based upon RSA public key cryptosystem. J. King Saud Univ. Comput. Inf. Sci. 32(9): 1081-1094 (2020) - 2019
- Keju Meng, Fuyou Miao, Yue Yu:
A secure and efficient on-line/off-line group key distribution protocol. Des. Codes Cryptogr. 87(7): 1601-1620 (2019) - Runhai Jiao, Hong Ouyang, Yukun Lin, Yaoming Luo, Gang Li, Zaiyu Jiang, Qian Zheng:
A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme. Inf. 10(5): 175 (2019) - 2018
- Hua Guo, Yandong Zheng, Xiong Li, Zhoujun Li, Chunhe Xia:
Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications. Future Gener. Comput. Syst. 89: 713-721 (2018) - 2017
- Jing Liu, Yunyun Wu, Xuezheng Liu, Yunchun Zhang, Gang Xue:
On the (In)Security of Recent Group Key Distribution Protocols. Comput. J. 60(4): 507-526 (2017) - Sarita Agrawal, Manik Lal Das:
Mutual healing enabled group-key distribution protocol in Wireless Sensor Networks. Comput. Commun. 112: 131-140 (2017) - 2014
- Cheng Guo, Chin-Chen Chang:
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem. Int. J. Commun. Syst. 27(1): 126-134 (2014) - 2010
- Chengzhe Li, Hongfeng Zhu, Tianhua Liu:
An Improved Tree-Based Distribution Group Key Agreement Protocol. CASoN 2010: 89-92 - 2008
- Tzong-Chen Wu, Thsia-Tzu Huang, Chien-Lung Hsu, Kuo-Yu Tsai:
Recursive protocol for group-oriented authentication with key distribution. J. Syst. Softw. 81(7): 1227-1239 (2008) - 2007
- Irina Hossain, Syed Masud Mahmud:
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network. WiMob 2007: 25 - 2005
- Fuwen Liu, Hartmut König:
A Token Based Key Distribution Protocol for Closed Group Meetings. Net-Con 2005: 29-43 - 2003
- Jyh-How Huang, Shivakant Mishra:
Mykil: a highly scalable key distribution protocol for large group multicast. GLOBECOM 2003: 1476-1480 - 2001
- Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar:
ELK, A New Protocol for Efficient Large-Group Key Distribution. S&P 2001: 247-262 - 1996
- Andrew Hutchison, Kurt Bauknecht:
Cryptographic key distribution and authentication protocols for secure group communication. SEC 1996: 492-493
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-11 17:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint