Cryptology ePrint Archive: Report 2011/216
Available versions in chronological order
20110507:220338 (posted 07-May-2011 22:03:38 UTC)
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere
Shaohua Tang and Jintai Ding and Zhiming Yang
20110508:093350 (posted 08-May-2011 09:33:50 UTC)
Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere
Shaohua Tang and Jintai Ding and Zhiming Yang
20120816:155857 (posted 16-Aug-2012 15:58:57 UTC)
Provably Secure Group Key Management Approach
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
20120816:160114 (posted 16-Aug-2012 16:01:14 UTC)
Provably Secure Group Key Management Approach
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
20120816:160407 (posted 16-Aug-2012 16:04:07 UTC)
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
20121027:055540 (posted 27-Oct-2012 05:55:40 UTC)
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
20140103:100500 (posted 03-Jan-2014 10:05:00 UTC)
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
20140103:100743 (posted 03-Jan-2014 10:07:43 UTC)
Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
Original publication (with minor differences): will appear in IEEE Transactions on Parallel and Distributed Systems
[
Cryptology ePrint archive
]