Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hartono Kurnio
@inproceedings{DBLP:conf/awcc/KurnioWPG04, author = {Hartono Kurnio and Huaxiong Wang and Josef Pieprzyk and Kris Gaj}, editor = {Chi{-}Hung Chi and Kwok{-}Yan Lam}, title = {Securing Multicast Groups in Ad Hoc Networks}, booktitle = {Content Computing, Advanced Workshop on Content Computing, {AWCC} 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3309}, pages = {194--207}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30483-8\_24}, doi = {10.1007/978-3-540-30483-8\_24}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/awcc/KurnioWPG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurnioSW02, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A Secure Re-keying Scheme with Key Recovery Property}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {40--55}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_4}, doi = {10.1007/3-540-45450-0\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurnioSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KurnioMSW02, author = {Hartono Kurnio and Luke McAven and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Dynamic Group Key Distribution Scheme with Flexible User Join}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {478--496}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_33}, doi = {10.1007/3-540-36552-4\_33}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KurnioMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KurnioSW02, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {A Group Key Distribution Scheme with Decentralised User Join}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {146--163}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_11}, doi = {10.1007/3-540-36413-7\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KurnioSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KurnioSW01, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Kwangjo Kim}, title = {Efficient Revocation Schemes for Secure Multicast}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {160--177}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_13}, doi = {10.1007/3-540-45861-1\_13}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KurnioSW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurnioSSW00, author = {Hartono Kurnio and Reihaneh Safavi{-}Naini and Willy Susilo and Huaxiong Wang}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Key Management for Secure Multicast with Dynamic Controller}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {178--190}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_15}, doi = {10.1007/10718964\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurnioSSW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.