Common use of Xxxxxxxxx and X Clause in Contracts

Xxxxxxxxx and X. Xxxxxxx: A secure and efficient conference key distribution system. Eurocrypt’94, LNCS 950, pp.275–286, 1994. [17] X. Xxxxxx and M.E. Xxxxxxx: New Directions in cryptography. IEEE Transactions on Information Theory, vol.22, pp.644-654, 1976. [18] X. Xxxxxx, X. xxx Xxxxxxxx, and X. Xxxxxx: Authentication and authenticated key ex- changes. Designs, Codes, and Cryptography, vol.2, pp.107–125, 1992. [19] X. XxXxxxx: A public key cryptosystem and a signature scheme based on discrete loga- rithms. IEEE Trans. on Information Theory, vol.31, no.4, pp.469–472, July 1985. [20] X. Xxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx, “A digital signature scheme secure against adap- tive chosen-message attacks. SIAM Journal of Computing, vol.17, no.2, pp.281–308, 1988. [21] X. Xxxxxxxxxxx, X. Xxxx, and X. Xxxx: A conference key distribution system. IEEE Trans. on Information Theory, vol.28, no.5, pp.714–720, September 1982. [22] M. Just and X. Xxxxxxxx: Authenticated multi-party key agreement. Asiacrypt’96, LNCS 1163, pp.36-49, 1996. [23] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. of 7th ACM Conf. on Computer and Communications Security, pp.235–244, 2000. [24] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Communication-efficient group key agreement. In Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC’01), pp.229–244, June 2001. [25] X. Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange. Crypto’03, LNCS 2729, pp.110–125, August 2003.

Appears in 2 contracts

Samples: citeseerx.ist.psu.edu, eprint.iacr.org

AutoNDA by SimpleDocs

Xxxxxxxxx and X. Xxxxxxx: . A secure and efficient conference key distribution system. Eurocrypt’94In EUROCRYPT, LNCS 950, pp.275–286pages 275–286, 1994. [175] X. Xxxxxx and M.E. Xxxxxxx: New Directions in cryptographyX. Xxxxxx. IEEE Transactions on Information TheoryAsynchronous group key exchange with failures. In PODC, vol.22pages 357–366, pp.644-654, 19762004. [186] X. XxxxxxXxxxx, X. xxx Xxxxxxxx, X. Xxx, X. XxXxxxx, and X. Xxxxx. A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM ToN, 5(6):784–803, 1997. [7] X. Xxxxxxx, X. Xxx, and X. Xxxxxx: Authentication and authenticated . Robust group key ex- changesagreement using short broadcasts. DesignsIn ACM CCS, Codespages 411–420, and Cryptography, vol.2, pp.107–125, 19922007. [198] X. XxXxxxx: A public key cryptosystem and a signature scheme based on discrete loga- rithms. IEEE Trans. on Information Theory, vol.31, no.4, pp.469–472, July 1985. [20] X. Xxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx, “A digital signature scheme secure against adap- tive chosen-message attacks. SIAM Journal of Computing, vol.17, no.2, pp.281–308, 1988. [21] X. Xxxxxxxxxxx, X. Xxxx, Xxxx and X. Xxxx: A conference . Scalable protocols for authenticated group key distribution systemexchange. IEEE Trans. on Information TheoryJournal of Cryptology, vol.2820(1):85–113, no.5, pp.714–720, September 19822007. [22] M. Just and X. Xxxxxxxx: Authenticated multi-party key agreement. Asiacrypt’96, LNCS 1163, pp.36-49, 1996. [239] X. Xxx, X. Xxxxxx, and X. Xxxxxx: . Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. of 7th ACM Conf. Conference on Computer and Communications Security, pp.235–244pages 235–244, 2000. [2410] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Communication. Group key agreement efficient in communication. IEEE ToC, 33(7), 2004. [11] X. Xxxxxxx, X. xxx Xxxxxxxx, and X. Xxxxxxxx. Handbook of Applied Cryptography. CRC Press, 1996. [12] X. Xxxxx, X. Xxxx, X. Xxxxxxx-efficient group key agreementXxxxx, and X. Xxxxxxx. Extended virtual synchrony. In Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC’01)ICDCS, pp.229–244pages 56–65, June 20011994. [2513] X. Xxxx Xxxx, X. Xxxxxxx, X. Xxx, and X. Xxxx: Scalable protocols for authenticated group key exchangeXxxxxxxxxxxx. Crypto’03Reliable multicast transport protocol (rmtp). IEEE JSAC, LNCS 272915(3):407–421, pp.110–1251997. [14] X. Xxxxx, August 2003.X. Xxxxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx. A secure audio teleconference system. CRYPTO’88, Aug 1990. [15] X. Xxxxxxx, X. Xxxxxx, and X. Xxxxxxx. Key agreement in dynamic peer groups. IEEE TPDS, 11(8):769–780, 2000. A Xxxxxxxxx-Xxxxxxx GKA

Appears in 1 contract

Samples: citeseerx.ist.psu.edu

Xxxxxxxxx and X. Xxxxxxx: . A secure and efficient conference key distribution system. Eurocrypt’94In EUROCRYPT, LNCS 950, pp.275–286pages 275–286, 1994. [175] X. Xxxxxx and M.E. Xxxxxxx: New Directions in cryptographyX. Xxxxxx. IEEE Transactions on Information TheoryAsynchronous group key exchange with failures. In PODC, vol.22pages 357–366, pp.644-654, 19762004. [186] X. XxxxxxXxxxx, X. xxx Xxxxxxxx, X. Xxx, X. XxXxxxx, and X. Xxxxx. A reliable multicast framework for light-weight sessions and application level framing. IEEE/ACM ToN, 5(6):784–803, 1997. [7] X. Xxxxxxx, X. Xxx, and X. Xxxxxx: Authentication and authenticated . Robust group key ex- changesagreement using short broadcasts. DesignsIn ACM CCS, Codespages 411–420, and Cryptography, vol.2, pp.107–125, 19922007. [198] X. XxXxxxx: A public key cryptosystem and a signature scheme based on discrete loga- rithms. IEEE Trans. on Information Theory, vol.31, no.4, pp.469–472, July 1985. [20] X. Xxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx, “A digital signature scheme secure against adap- tive chosen-message attacks. SIAM Journal of Computing, vol.17, no.2, pp.281–308, 1988. [21] X. Xxxxxxxxxxx, X. Xxxx, Xxxx and X. Xxxx: A conference . Scalable protocols for authenticated group key distribution systemexchange. IEEE Trans. on Information TheoryJournal of Cryptology, vol.2820(1):85–113, no.5, pp.714–720, September 19822007. [22] M. Just and X. Xxxxxxxx: Authenticated multi-party key agreement. Asiacrypt’96, LNCS 1163, pp.36-49, 1996. [239] X. Xxx, X. Xxxxxx, and X. Xxxxxx: . Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. of 7th ACM Conf. Conference on Computer and Communications Security, pp.235–244pages 235–244, 2000. [2410] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Communication. Group key agreement efficient in communication. IEEE ToC, 33(7), 2004. [11] X. Xxxxxxx, X. xxx Xxxxxxxx, and X. Xxxxxxxx. Handbook of Applied Cryptography. CRC Press, 1996. [12] X. Xxxxx, X. Xxxx, X. Xxxxxxx-efficient group key agreementXxxxx, and X. Xxxxxxx. Extended virtual synchrony. In Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC’01)ICDCS, pp.229–244pages 56–65, June 20011994. [2513] X. Xxxx Xxxx, X. Xxxxxxx, X. Xxx, and X. Xxxx: Scalable protocols for authenticated group key exchangeXxxxxxxxxxxx. Crypto’03Reliable multicast transport protocol (rmtp). IEEE JSAC, LNCS 272915(3):407–421, pp.110–1251997. [14] X. Xxxxx, August 2003.X. Xxxxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx. A secure audio teleconference system. CRYPTO’88, Aug 1990. [15] X. Xxxxxxx, X. Xxxxxx, and X. Xxxxxxx. Key agreement in dynamic peer groups. IEEE TPDS, 11(8):769–780, 2000. A Xxxxxxxxx-Xxxxxxx GKA The BD GKA protocol proceeds in two rounds (see Figure 6): First each player Pi broadcasts a public counterpart zi = gti of its contribution ti to the key. In the second round each Pi broadcasts gadget X[i−1,i,i+1] = gtiti+1 −ti−1 ti (which it can compute as X[i−1,i,i+1] = (zi+1/zi)ti ). Given the set of gadget values X[n,1,2], X[1,2,3], ..., X[n−1,n,1],

Appears in 1 contract

Samples: eprint.iacr.org

AutoNDA by SimpleDocs

Xxxxxxxxx and X. Xxxxxxx: A secure and efficient conference key distribution system. Eurocrypt’94, LNCS 950, pp.275–286, 1994. [17] X. Xxxxxx and M.E. X.X. Xxxxxxx: New Directions in cryptography. IEEE Transactions on Information Theory, vol.22, pp.644-654, 1976. [18] X. Xxxxxx, X. P. xxx Xxxxxxxx, and X. Xxxxxx: Authentication and authenticated key ex- changes. Designs, Codes, and Cryptography, vol.2, pp.107–125, 1992. [19] X. XxXxxxx: A public key cryptosystem and a signature scheme based on discrete loga- rithms. IEEE Trans. on Information Theory, vol.31, no.4, pp.469–472, July 1985. [20] X. Xxxxxxxxxx, X. Xxxxxx, and X. Xxxxxx, “A digital signature scheme secure against adap- tive chosen-message attacks. SIAM Journal of Computing, vol.17, no.2, pp.281–308, 1988. [21] X. I. Xxxxxxxxxxx, X. XxxxTang, and X. Xxxx: A conference key distribution system. IEEE Trans. on Information Theory, vol.28, no.5, pp.714–720, September 1982. [22] M. Just and X. Xxxxxxxx: Authenticated multi-party key agreement. Asiacrypt’96, LNCS 1163, pp.36-49, 1996. [23] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Simple and fault-tolerant key agreement for dynamic collaborative groups. In Proc. of 7th ACM Conf. on Computer and Communications Security, pp.235–244, 2000. [24] X. Xxx, X. Xxxxxx, and X. Xxxxxx: Communication-efficient group key agreement. In Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC’01), pp.229–244, June 2001. [25] X. Xxxx and X. Xxxx: Scalable protocols for authenticated group key exchange. Crypto’03, LNCS 2729, pp.110–125, August 2003.

Appears in 1 contract

Samples: citeseerx.ist.psu.edu

Time is Money Join Law Insider Premium to draft better contracts faster.