-
1
-
-
0020704038
-
Digital signatures: A tutorial survey
-
February
-
S. G. Akl. Digital signatures: a tutorial survey. Computer, 16(2):15-24, February 1983.
-
(1983)
Computer
, vol.16
, Issue.2
, pp. 15-24
-
-
Akl, S.G.1
-
2
-
-
0019636958
-
Authentication of signatures using public key encryption
-
November
-
K. S. Booth. Authentication of signatures using public key encryption. Communications of the ACM, 24(11):772-774, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 772-774
-
-
Booth, K.S.1
-
3
-
-
0020705956
-
Protocols for data security
-
February
-
R. DeMillo and M. Merritt. Protocols for data security. Computer, 16(2):39-50, February 1983.
-
(1983)
Computer
, vol.16
, Issue.2
, pp. 39-50
-
-
DeMillo, R.1
Merritt, M.2
-
5
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
T. ElGamal. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, IT-31(4):469-472, July 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
6
-
-
0025849585
-
How to time-stamp a digital document
-
S. Haber and W. S. Stornetta. How to time-stamp a digital document. Journal of Cryptology, 3(2):99-111, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, Issue.2
, pp. 99-111
-
-
Haber, S.1
Stornetta, W.S.2
-
7
-
-
0345092813
-
Legal recognition of digital signatures
-
June
-
L. Hollaar and A. Asay. Legal recognition of digital signatures. IEEE Micro, 16(3):44-45, June 1996.
-
(1996)
IEEE Micro
, vol.16
, Issue.3
, pp. 44-45
-
-
Hollaar, L.1
Asay, A.2
-
10
-
-
84889162414
-
-
Private communication. May
-
C. J. Mitchell. Private communication. May 1998.
-
(1998)
-
-
Mitchell, C.J.1
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir and L. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
12
-
-
0344661881
-
-
PhD Thesis, University of Cambridge
-
M. Roe. Cryptography and evidence. PhD Thesis, University of Cambridge, 1997.
-
(1997)
Cryptography and Evidence
-
-
Roe, M.1
-
14
-
-
0012690893
-
-
PhD Thesis, University of London, December
-
J. Zhou. Non-repudiation. PhD Thesis, University of London, December 1996.
-
(1996)
Non-repudiation
-
-
Zhou, J.1
-
15
-
-
84956868635
-
A secure pay-per-view scheme for web-based video service
-
Lecture Notes in Computer Science 1560, Kamakura, Japan, March
-
J. Zhou and K. Y. Lam. A secure pay-per-view scheme for web-based video service. Lecture Notes in Computer Science 1560, Proceedings of 1999 International Workshop on Practice and Theory in Public Key Cryptography, pages 315-326, Kamakura, Japan, March 1999.
-
(1999)
Proceedings of 1999 International Workshop on Practice and Theory in Public Key Cryptography
, pp. 315-326
-
-
Zhou, J.1
Lam, K.Y.2
-
16
-
-
0032626169
-
Securing digital signatures for non-repudiation
-
Elsevier, May
-
J. Zhou and K. Y. Lam. Securing digital signatures for non-repudiation. Computer Communications, 22(8):710-716, Elsevier, May 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 710-716
-
-
Zhou, J.1
Lam, K.Y.2
|