Efficient Identity-Based Conference Key Distribution Protocols

Shahrokh Saeednia, Reihaneh Safavi-Naini. Efficient Identity-Based Conference Key Distribution Protocols. In Colin Boyd, Ed Dawson, editors, Information Security and Privacy, Third Australasian Conference, ACISP 98, Brisbane, Queensland, Australia, July 1998, Proceedings. Volume 1438 of Lecture Notes in Computer Science, pages 320-331, Springer, 1998. [doi]

@inproceedings{SaeedniaS98:0,
  title = {Efficient Identity-Based Conference Key Distribution Protocols},
  author = {Shahrokh Saeednia and Reihaneh Safavi-Naini},
  year = {1998},
  url = {http://link.springer.de/link/service/series/0558/bibs/1438/14380320.htm},
  tags = {rule-based, protocol},
  researchr = {https://researchr.org/publication/SaeedniaS98%3A0},
  cites = {0},
  citedby = {0},
  pages = {320-331},
  booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP 98, Brisbane, Queensland, Australia, July 1998, Proceedings},
  editor = {Colin Boyd and Ed Dawson},
  volume = {1438},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-64732-5},
}