2002 |
27 | EE | Thomas Hardjono,
Hugh Harney:
Group Security Policy Management for IP Multicast and Group Security.
NETWORKING 2002: 1123-1128 |
2001 |
26 | EE | Lakshminath R. Dondeti,
Brian Haberman,
Haldon J. Sandick,
Thomas Hardjono,
Haixiang He:
MBA: A Tool for Multicast Billing and Accounting.
ISCC 2001: 172-177 |
25 | | Thomas Hardjono,
Mark Baugher,
Hugh Harney:
Group Security Association (GSA) Management in IP Multicast.
SEC 2001: 213-228 |
24 | EE | Thomas Hardjono,
Mark Baugher,
Hugh Harney:
Group Key Management for IP Multicast: Model & Architecture.
WETICE 2001: 223-228 |
2000 |
23 | EE | Thomas Hardjono:
Router-Assistance for Receiver Access Control in PIM-SM.
ISCC 2000: 687-692 |
22 | EE | Thomas Hardjono:
RP-Based Multicast Receiver Access Control in PIM-SM.
NETWORKING 2000: 120-131 |
1999 |
21 | EE | Brad Cain,
Thomas Hardjono:
Collection servers: an architecture for multicast receiver reporting.
ACM Multimedia (2) 1999: 107-109 |
20 | | Thomas Hardjono,
Brad Cain:
PIM -SM Security: Interdomain Issues and Solutions.
Communications and Multimedia Security 1999: 191-208 |
19 | EE | Thomas Hardjono:
Key Management Framework for IP Multicast Infrastructure Security.
IS&N 1999: 385-398 |
18 | EE | Thomas Hardjono,
Brad Cain:
A Secure Group Membership Verification Protocol for IP Multicast.
ISCC 1999: 9-15 |
1998 |
17 | | Thomas Hardjono,
Naganand Doraswamy,
Brad Cain:
An Architecture for Conference-Support Using Secured Multicast.
HPN 1998: 79-93 |
16 | EE | Thomas Hardjono,
Brad Cain:
Secure and Scalable Inter-Domain Group Key Management for N-to-N Multicast.
ICPADS 1998: 478- |
1996 |
15 | | Thomas Hardjono,
Jennifer Seberry:
Replicating the Kuperee authentication server for increased security and reliability.
ACISP 1996: 14-26 |
14 | | Vijay Varadharajan,
Thomas Hardjono:
Security model for distributed object framework and its applicability to CORBA.
SEC 1996: 452-463 |
13 | | Azad Jiwa,
Thomas Hardjono,
Jennifer Seberry:
Beacons for Authentication in Distributed Systems.
Journal of Computer Security 4(1): 81-96 (1996) |
1995 |
12 | | Thomas Hardjono,
Jennifer Seberry:
Information Security in Mobile Databases.
Australasian Database Conference 1995: 0- |
11 | EE | Thomas Hardjono,
Jennifer Seberry:
Applications of smartcards for anonymous and verifiable databases.
Computers & Security 14(5): 465-472 (1995) |
1994 |
10 | EE | Thomas Hardjono,
Jennifer Seberry:
Authentication via Multi-Service Tickets in the Kuperee Server.
ESORICS 1994: 143-160 |
9 | | Thomas Hardjono,
Yuliang Zheng,
Jennifer Seberry:
Kuperee: An Approach to Authentication using Public Keys.
ULPAA 1994: 65-76 |
8 | | Yuliang Zheng,
Thomas Hardjono,
Jennifer Seberry:
Reusing Shares in Secret Sharing Schemes.
Comput. J. 37(3): 199-205 (1994) |
7 | EE | Thomas Hardjono,
Tadashi Ohta:
Secure end-to-end delegations in distributed systems.
Computer Communications 17(3): 230-238 (1994) |
6 | EE | Thomas Hardjono,
Yuliang Zheng,
Jennifer Seberry:
Database authentication revisited.
Computers & Security 13(7): 573-580 (1994) |
1993 |
5 | | Thomas Hardjono,
Tadashi Ohta:
Fixed-Path Proxy-Logins with Assured Termination.
ICCI 1993: 111-115 |
1992 |
4 | | Thomas Hardjono,
Yuliang Zheng:
A Practical Digital Multisignature Scheme Based on Discrete Logarithms.
AUSCRYPT 1992: 122-132 |
1991 |
3 | | Yuliang Zheng,
Thomas Hardjono,
Josef Pieprzyk:
Sibling Intractable Function Families and Their Applications (Extended Abstract).
ASIACRYPT 1991: 124-138 |
1990 |
2 | | Thomas Hardjono:
Record Encryption in Distributed Databases.
AUSCRYPT 1990: 386-395 |
1 | EE | Thomas Hardjono,
Jennifer Seberry:
Search Key Substitution in the Encipherment of B-Trees.
VLDB 1990: 50-58 |