Linked e-resources
Details
Table of Contents
Introduction
Some Useful Constructions
Non-scalable Key Distribution Schemes
MLS for Internet Security Protocols
Scalable Key Distribution Schemes
Scalable Extensions of Non-scalable Schemes
Using PKPSs With Tamper-Responsive Modules
Broadcast Authentication and Broadcast Encryption
Authenticated Data Structures
Universal Trusted Computing Bases
Conclusions and References.
Some Useful Constructions
Non-scalable Key Distribution Schemes
MLS for Internet Security Protocols
Scalable Key Distribution Schemes
Scalable Extensions of Non-scalable Schemes
Using PKPSs With Tamper-Responsive Modules
Broadcast Authentication and Broadcast Encryption
Authenticated Data Structures
Universal Trusted Computing Bases
Conclusions and References.