Cryptanalysis of two group key management protocols for secure multicast
Saved in:
Published in | Lecture notes in computer science pp. 35 - 48 |
---|---|
Main Author | |
Format | Conference Proceeding |
Language | English |
Published |
Berlin
Springer
2005
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Author | WEN TAO ZHU |
---|---|
Author_xml | – sequence: 1 surname: WEN TAO ZHU fullname: WEN TAO ZHU organization: State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, P.O. Box 4588, Beijing 100049, China |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17414753$$DView record in Pascal Francis |
BookMark | eNotjEFLwzAYhgNOcJv7D7l4LCRL0jRHKeqEwS56Hl-TfKPaNiFJkf57C_pengceeHdkM4XJ35GdUJIJ1kjDNmS72rEyWooHcsj5i60TXDOtt-TUpiUWmGBYcp9pQFp-Ar2lMEf67Rc6runmRz8VGlMowYYhUwyJZm_n5Ok4D6W3kMsjuUcYsj_8c08-X18-2lN1vry9t8_nKnKuSmWR1bVSziBD4Mx33njZ1azhHAF4Y9CoTtfolFHWIbMKuqPV3oHjKBUXe_L09xshWxgwwWT7fI2pHyEtV64ll1oJ8QuusU7G |
ContentType | Conference Proceeding |
Copyright | 2006 INIST-CNRS |
Copyright_xml | – notice: 2006 INIST-CNRS |
DBID | IQODW |
DatabaseName | Pascal-Francis |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Computer Science |
EndPage | 48 |
ExternalDocumentID | 17414753 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF IQODW LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-p115t-cf06655d9f0fa10ebe9e4b60811faa189f95b76fd595cdf0c5ab2c7edad1f4513 |
ISBN | 3540308490 9783540308492 |
ISSN | 0302-9743 |
IngestDate | Wed Apr 02 07:31:53 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Multicast Confidentiality Transmission protocol Algorithmics Cryptanalysis Public key cryptography Distributed system Modeling Computer security Security key |
Language | English |
License | CC BY 4.0 |
LinkModel | OpenURL |
MeetingName | Cryptology and network security (4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005) |
MergedId | FETCHMERGED-LOGICAL-p115t-cf06655d9f0fa10ebe9e4b60811faa189f95b76fd595cdf0c5ab2c7edad1f4513 |
PageCount | 14 |
ParticipantIDs | pascalfrancis_primary_17414753 |
PublicationCentury | 2000 |
PublicationDate | 2005 |
PublicationDateYYYYMMDD | 2005-01-01 |
PublicationDate_xml | – year: 2005 text: 2005 |
PublicationDecade | 2000 |
PublicationPlace | Berlin |
PublicationPlace_xml | – name: Berlin |
PublicationTitle | Lecture notes in computer science |
PublicationYear | 2005 |
Publisher | Springer |
Publisher_xml | – name: Springer |
SSID | ssj0000317077 ssj0002792 |
Score | 1.7832394 |
SourceID | pascalfrancis |
SourceType | Index Database |
StartPage | 35 |
SubjectTerms | Applied sciences Computer science; control theory; systems Computer systems and distributed systems. User interface Cryptography Exact sciences and technology Information, signal and communications theory Memory and file management (including protection and security) Memory organisation. Data processing Signal and communications theory Software Telecommunications and information theory |
Title | Cryptanalysis of two group key management protocols for secure multicast |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Na8IwFA_TXXbal2OfksNupaM1TT-OIg4R53bQTXaRpEmOVrRjbH_9XtLYWhHGdiklLSX0l-a99-t7v4fQfawUuAGcumDLQjegPHHjDiGuTOACIyKQQlMDT-NwMA2GMzqreoya6pKcP6Tfe-tK_oMqjAGuukr2D8iWD4UBOAd84QgIw3HH-d1rZ0aW_19kuUmrMvnhukWDY-3a9nrorb6W4AhWEiT5Z-aYmg4HvmObxWoyA7R0Qwbrwyg1OGtNyMsi8TBl6zJL5q0_dibdZ-d9MK0xB3SHOdgwh7WIUtNAxIuDZJt0JLBrQtxBtja6QmPEmsxCK7MuZr1jZMrUP4iA_ABipAZqgHPSRIfd_nD0WtJisMdEXlTGzJ7WNyx-BBVTsOU5ZopWsquask5sZWtY26poSrLlKUxOUKuqocQvJWqn6EAuztCxdfqx3VLXMLTpq7EZO0eDGlY4UxiwwgYrDFjhCitcYoUBK1xghUusWmj62J_0Bq7teOEuwTPP3VTpP2FUJMpTzPfgA0tkwENw23zFmB8nKqE8CpWgCU2F8lLKeCeNpGDCVwH1yQVqLrKFvETY6PYQGTNfiEC3uOdEMRHHvCMi1pHpFWrX3tV8WaibzDcAXf92ww06qlbVLWrmqw95Bx5aztsW1R9tm0Bx |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=Lecture+notes+in+computer+science&rft.atitle=Cryptanalysis+of+two+group+key+management+protocols+for+secure+multicast&rft.au=WEN+TAO+ZHU&rft.date=2005-01-01&rft.pub=Springer&rft.isbn=9783540308492&rft.issn=0302-9743&rft.spage=35&rft.epage=48&rft.externalDBID=n%2Fa&rft.externalDocID=17414753 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |