-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S. G. and Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1, 239-248.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84976731140
-
A key distribution protocol using event markers
-
Bauer, R. K., Berson, T. A. and Feiertag, R. J. (1983). A key distribution protocol using event markers. ACM Transactions on Computer Systems, 1, 249-255.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, pp. 249-255
-
-
Bauer, R.K.1
Berson, T.A.2
Feiertag, R.J.3
-
3
-
-
0026153410
-
Remote password authentication with smart cards
-
Chang, C. C. and Wu, T. C. (1991). Remote password authentication with smart cards. IEE Proceedings-E, 138, 165-168.
-
(1991)
IEE Proceedings-E
, vol.138
, pp. 165-168
-
-
Chang, C.C.1
Wu, T.C.2
-
4
-
-
0011869977
-
Remote password authentication with smart cards (correspondence)
-
Chang, C. C. and Laih, C. S. (1992). Remote password authentication with smart cards (correspondence). IEE Proceedings-E, 139, 372.
-
(1992)
IEE Proceedings-E
, vol.139
, pp. 372
-
-
Chang, C.C.1
Laih, C.S.2
-
7
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal, T. (1985). A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 31, 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, pp. 469-472
-
-
ElGamal, T.1
-
8
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
Evans, A. Jr., Kantrowitz, W. and Weiss, E. (1974). A user authentication scheme not requiring secrecy in the computer. Communications of the ACM, 17, 437-442.
-
(1974)
Communications of the ACM
, vol.17
, pp. 437-442
-
-
Evans A., Jr.1
Kantrowitz, W.2
Weiss, E.3
-
9
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Fiat, A. and Shamir, A. (1986). How to prove yourself: practical solutions to identification and signature problems. Advances in Cryptology, CRYPTO'86, pp. 186-194.
-
(1986)
Advances in Cryptology, CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
11
-
-
0019057051
-
The design of a cryptography based secure file system
-
Gudes, E. (1980). The design of a cryptography based secure file system. IEEE Transactions on Software Engineering, OSE-6, 411-420.
-
(1980)
IEEE Transactions on Software Engineering
, vol.OSE-6
, pp. 411-420
-
-
Gudes, E.1
-
15
-
-
0019550970
-
A user authentication scheme for shared data based on trap-door one-way functions
-
Ingemarsson, I. and Wong, C. K. (1981). A user authentication scheme for shared data based on trap-door one-way functions. Information Processing Letters, 12, 63-67.
-
(1981)
Information Processing Letters
, vol.12
, pp. 63-67
-
-
Ingemarsson, I.1
Wong, C.K.2
-
16
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L. (1981). Password authentication with insecure communication. Communications of the ACM, 24, 770-772.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
18
-
-
0002586876
-
A digital signature based on a conventional encryption function
-
Merkle, R. C. (1989). A digital signature based on a conventional encryption function. Advances in Cryptology, CRYPTO'89, pp. 218-238.
-
(1989)
Advances in Cryptology, CRYPTO'89
, pp. 218-238
-
-
Merkle, R.C.1
-
20
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
Naor, M. and Yung, M. (1989). Universal one-way hash functions and their cryptographic applications. Proc. of the 21st STOC, pp. 33-43.
-
(1989)
Proc. of the 21st STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
21
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R. M. and Schroeder, M. D. (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21, 993-999.
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
23
-
-
0024613514
-
Security issues in the use of smart cards
-
Reid, M. A. and Madari, M. S. (1989). Security issues in the use of smart cards. Computer Communications, 12, 25-30.
-
(1989)
Computer Communications
, vol.12
, pp. 25-30
-
-
Reid, M.A.1
Madari, M.S.2
-
24
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
Rompel, J. (1990). One-way functions are necessary and sufficient for secure signatures. Proc. of the 22nd STOC, pp. 387-394.
-
(1990)
Proc. of the 22nd STOC
, pp. 387-394
-
-
Rompel, J.1
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
26
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu, R. S. (1988). Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters, 27, 95-98.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
27
-
-
85020598353
-
Identity based cryptosystems & signature schemes
-
Shamir, A. (1984). Identity based cryptosystems & signature schemes. Advances in Cryptology, CRYPTO'84, pp. 47-53.
-
(1984)
Advances in Cryptology, CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
28
-
-
0021939027
-
On improvements to password security
-
Singh, K. (1985). On improvements to password security. Operating System Review, 19, 53-60.
-
(1985)
Operating System Review
, vol.19
, pp. 53-60
-
-
Singh, K.1
-
29
-
-
0040545605
-
The future is in the PC cards
-
Sternglass, D. (1992). The future is in the PC cards. IEEE Spectrum, 29, 46-50.
-
(1992)
IEEE Spectrum
, vol.29
, pp. 46-50
-
-
Sternglass, D.1
-
30
-
-
0025496293
-
When a password is not a password
-
Weiss, K. P. (1986). When a password is not a password. IEEE Comuter, pp. 100-108.
-
(1986)
IEEE Comuter
, pp. 100-108
-
-
Weiss, K.P.1
-
32
-
-
0347767593
-
Smardcards: Smarter than passwords
-
Wood, L. (1991). Smardcards: smarter than passwords. Datamation, 37, 69-70.
-
(1991)
Datamation
, vol.37
, pp. 69-70
-
-
Wood, L.1
|