Author of the publication

An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting.

, , and . IEEE Trans. Dependable Secur. Comput., 5 (2): 65-70 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Cryptographic Hash Functions., and . IACR Cryptology ePrint Archive, (2006)Aurifeuillian factorizations and the period of the Bell numbers modulo a prime.. Math. Comput., 65 (213): 383-391 (1996)Watermarking with quadratic residues., and . Security and Watermarking of Multimedia Contents, volume 3657 of SPIE Proceedings, page 283-288. SPIE, (1999)An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting., , and . IEEE Trans. Dependable Secur. Comput., 5 (2): 65-70 (2008)MPQS with Three Large Primes., , , , and . ANTS, volume 2369 of Lecture Notes in Computer Science, page 446-460. Springer, (2002)An extended-precision operand computer for integer factoring., and . AFIPS National Computer Conference, volume 53 of AFIPS Conference Proceedings, page 115-121. AFIPS Press, (1984)Prime Numbers with a Fixed Number of One Bits or Zero Bits in Their Binary Representation.. Experimental Mathematics, 10 (2): 267-273 (2001)Is There a Shortage of Primes for Cryptography?. Int. J. Netw. Secur., 3 (3): 296-299 (2006)Square form factorization., and . Math. Comput., 77 (261): 551-588 (2008)The period of the Bell numbers modulo a prime., , and . Math. Comput., 79 (271): 1793-1800 (2010)