Author of the publication

Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.

, , and . ICICS, volume 3269 of Lecture Notes in Computer Science, page 375-387. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems., , and . ICB, volume 5558 of Lecture Notes in Computer Science, page 806-815. Springer, (2009)Security Weaknesses of Certain Broadcast Encryption Schemes., , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 228-245. Springer, (2005)A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 444-458. Springer, (2007)A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes., and . AAECC, volume 357 of Lecture Notes in Computer Science, page 443-453. Springer, (1988)Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences., , and . AAECC, volume 673 of Lecture Notes in Computer Science, page 304-315. Springer, (1993)An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths., , , , , , and . AAECC, volume 4851 of Lecture Notes in Computer Science, page 80-89. Springer, (2007)Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2., , , , and . AES Candidate Conference, page 242-254. National Institute of Standards and Technology,, (2000)Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents., , and . CT-RSA, volume 2020 of Lecture Notes in Computer Science, page 392-407. Springer, (2001)Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions., , , and . ICICS, volume 2513 of Lecture Notes in Computer Science, page 85-96. Springer, (2002)Hybrid Intrusion Detection Model Based on Ordered Sequences., and . MMM-ACNS, volume 3685 of Lecture Notes in Computer Science, page 352-365. Springer, (2005)