BibTeX records: Hartono Kurnio

download as .bib file

@inproceedings{DBLP:conf/awcc/KurnioWPG04,
  author       = {Hartono Kurnio and
                  Huaxiong Wang and
                  Josef Pieprzyk and
                  Kris Gaj},
  editor       = {Chi{-}Hung Chi and
                  Kwok{-}Yan Lam},
  title        = {Securing Multicast Groups in Ad Hoc Networks},
  booktitle    = {Content Computing, Advanced Workshop on Content Computing, {AWCC}
                  2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3309},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30483-8\_24},
  doi          = {10.1007/978-3-540-30483-8\_24},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/awcc/KurnioWPG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurnioSW02,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A Secure Re-keying Scheme with Key Recovery Property},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_4},
  doi          = {10.1007/3-540-45450-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurnioSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KurnioMSW02,
  author       = {Hartono Kurnio and
                  Luke McAven and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Dynamic Group Key Distribution Scheme with Flexible User Join},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {478--496},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_33},
  doi          = {10.1007/3-540-36552-4\_33},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KurnioMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KurnioSW02,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {A Group Key Distribution Scheme with Decentralised User Join},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_11},
  doi          = {10.1007/3-540-36413-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KurnioSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KurnioSW01,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Kwangjo Kim},
  title        = {Efficient Revocation Schemes for Secure Multicast},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {160--177},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_13},
  doi          = {10.1007/3-540-45861-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KurnioSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurnioSSW00,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Key Management for Secure Multicast with Dynamic Controller},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {178--190},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_15},
  doi          = {10.1007/10718964\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurnioSSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics