Search Results

1 - 10 of 10,449 items :

Clear All

References 1. Judge, P., M. Ammar. Security Issues and Solutions in Multicast Content Distribution: A Survey. – Network, IEEE, Vol. 17 , 2003, pp. 30-36. 2. Challal, Y., H. Seba. Group Key Management Protocols: A Novel Taxonomy. – Enformatika, International Journal of Information Technology, Vol. 2 , 2005. 3. Bibo, J., H. Xiulin. A Survey of Group Key Management. – In: Computer Science and Software Engineering, 2008 International Conference on, 2008, pp. 994-1002. 4. Rafaeli, S., D. Hutchison. A Survey of Key Management for Secure Group Communication. – ACM

References [1] DIFFIE, W.-HELLMAN, M.: New directions in cryptography, IEEE Trans. Inform. Theory 22 (1976), 644-654. [2] INGEMARSSON, I.-TANG, D.-WONG, C.: A conference key distribution system, IEEE Trans. Inform. Theory 28 (1982), 714-720. [3] BURMESTER, M.-DESMEDT, Y.: A secure and efficient conference key distribution system, in: Advances in Cryptology-EUROCRYPT ’94 (A. De Santis, ed.), Workshop on the Theory and Appl. of Cryptographic Techniques, Perugia, Italy, 1994, Lecture Notes in Comput. Sci., Vol. 950, Springer, Berlin, 1994, pp. 275-286. [4] STEINER

References [1] C. Bennett, G. Brassard, S. Breidbart, and S. Wiesner.“Quantum cryptography, or unforgeable subway tokens”, in D. Chaum, R. Rivest, and A. Sherman, editors, Advances in Cryptology, 267-275, Springer US, 1983. [2] C. H. Bennett and G. Brassard.“Quantum cryptography: Public key distribution and coin tossing”, IEEE International Conference on Computers, Systems, and Signal Processing, p. 175, Bangalore, 1984. [3] C. Chang, Y. Chou, and T. D. Kieu.“An information hiding scheme using Sudoku”, ICICIC '08: Proceedings of the 2008 3rd International

References 1. Chen, J., Y. Long, K. Chen, G. J. Hook. Attribute-Based Key-Insulated Signature and Its Applications. – Information Sciences, Vol. 275 , 2014, pp. 57-67. 2. Dodis, Y., J. Katz, S. Xu, M. Yung. Key-Insulated Public-Key Cryptosystem. – In: Proc. of 21th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt), 28 April-2 May 2002. 3. Dodis, J. K., S. Xu, M. Yung. Key-Insulated Public-Key Cryptosystem. – In: Proc. of 9th International Conference on Theory and Practice in Public-Key Cryptography (PKC), 24

References [1] Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of- n Signatures from a Variety of Keys. In International Conference on the Theory and Application of Cryptology and Information Security , pages 415–432. Springer, 2002. [2] Ben Adida, Susan Hohenberger, and Ronald L Rivest. Ad-Hoc-Group Signatures from Hijacked Keypairs. In in DIMACS Workshop on Theft in E-Commerce , 2005. [3] Chris Alexander and Ian Goldberg. Improved User Authentication in Off-The-Record Messaging. In Workshop on Privacy in the Electronic Society , pages 41–47. ACM

Cryptology Conference, Santa Barbara, CA, USA, 2008, Lecture Notes in Comput. Sci., Vol. 5157, Springer, Berlin, 2008, pp. 108-125. [BM99a] BELLARE, M.-MINER, S. K.: A forward-secure digital signature scheme, in: Advances in Cryptology-CRYPTO ’99, Lecture Notes in Comput. Sci., Vol. 1666, Springer, Berlin, 1999, pp. 431-448. [BM99b] BELLARE, M.-MINER, S. K.: A forward-secure digital signature scheme,, July, 1999, Full version of [BM99a]. [BPS07] BACKES, M.-PFITZMANN, B.-SCEDROV, A.: Key-dependent message security under active

References 1. Haycock, John. Productivity toolkit for garment companies. RRije/Albania, USAID, 2011. 2. Hunter, Alan. Quick response in apparel manufacturing. 3. Suanmalu, Suthathip. A study of business performance through Key Performance Indicators (KPIs) in the Thai garment industry. 4. Performance measurement of companies -

References Abdalla, M., Benhamouda, F. and MacKenzie, P. (2015). Security of the J-PAKE password-authenticated key exchange protocol, IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, pp. 571–587. Abdalla, M., Bohli, J.-M., González Vasco, M.I. and Steinwandt, R. (2007). (Password) Authenticated key establishment: From 2-party to group, in S.P. Vadhan (Ed.), Theory of Cryptography Conference, TCC 2007 , Lecture Notes in Computer Science, Vol. 4392, Springer, Berlin/Heidelberg, pp. 499–514. Abdalla, M., Bresson, E., Chevassut, O. and

References [1] CHARKANI,M. E.-SAHMOUDI,M.: Sextic extension with cubic subfield, JP J.Algebra, Number Theory Appl. 34 (2014), 139-150. [2] CHILLALI, A.-SAHMOUDI, M.: Cryptography over sextic extension with cubic subfield, World Academy Sci. Engrg. Technol. 9 (2015), 246-249. [3] COHEN, H.: A Course in Computational Algebraic Number theory. GTM Springer-Verlag, Berlin, 1996. [4] DIFFIE, W.-HELLMAN,M. E.: New directions in cryptography, IEEE Trans. Inf. Theory 22 (1976), 644-654. [5] MENEZES, A. J.: Elliptic Curve Public key Cryptosystems. Foreword by Neal Koblitz

symmetric block cipher: “Kalina”-basic terms and specification, Applied Radioelectronic 6 (2007), special issue-devoted to the problems of information security, Kharkiv. (In Ukrainian) [5] BIRYUKOV, A.-KHOVRATOVICH, D.: Related-key cryptanalysis of the full ES-192 and AES-256, in: Advances in Cryptology-ASIACRYPT ’09 (M. Matsui, ed.), 15th Internat. Conf. on the Theory and Appl. of Cryptology and Information Security, Tokyo, Japan, 2009, Lecture Notes in Comput. Sci., Vol. 5912, Springer-Verlag, Berlin, 2009, pp. 1-18, [6