Cryptology ePrint Archive: Report 2011/216

Available versions in chronological order


Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere
Shaohua Tang and Jintai Ding and Zhiming Yang

Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere
Shaohua Tang and Jintai Ding and Zhiming Yang

Provably Secure Group Key Management Approach
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang

Provably Secure Group Key Management Approach
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang

Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang

Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang

Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang

Provably Secure Group Key Management Approach Based upon Hyper-sphere
Shaohua Tang and Lingling Xu and Niu Liu and Jintai Ding and Zhiming Yang
Original publication (with minor differences): will appear in IEEE Transactions on Parallel and Distributed Systems


[ Cryptology ePrint archive ]