메뉴 건너뛰기




Volumn Part F129452, Issue , 1996, Pages 489-498

Digital signets: Self-enforcing protection of digital information

Author keywords

[No Author keywords available]

Indexed keywords

CRIME; CRYPTOGRAPHY; COMPUTATIONAL COMPLEXITY; COMPUTER SOFTWARE; DIGITAL COMMUNICATION SYSTEMS; DIGITAL STORAGE; FUNCTIONS; USER INTERFACES;

EID: 0029720071     PISSN: 07378017     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/237814.237997     Document Type: Conference Paper
Times cited : (78)

References (25)
  • 2
    • 85031713513 scopus 로고
    • Ciphertext The RSA Newsletter
    • The Arcade Project: A Progress Report, Ciphertext The RSA Newsletter, Vol. 2, No. 1, 1994, p 6
    • (1994) The Arcade Project: A Progress Report , vol.2 , Issue.1 , pp. 6
  • 3
    • 85031745105 scopus 로고    scopus 로고
    • U. S. Patent, issued March 21, 1995, assigned to RSA Data Security, Inc., Redwood City, CA
    • U. S. Patent 500, 403, issued March 21, 1995, assigned to RSA Data Security, Inc., Redwood City, CA.
  • 4
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudo-random bits
    • M. Blum and S. Micali, How to generate cryptographically strong sequences of pseudo-random bits, SIAM J. Computing 13, pp. 850-863, 1984.
    • (1984) SIAM J. Computing , vol.13 , pp. 850-863
    • Blum, M.1    Micali, S.2
  • 5
    • 84957670625 scopus 로고
    • Collusion secure fingerprinting far digital data
    • LNCS, Springer
    • D. Boneh and Shaw, Collusion Secure Fingerprinting far Digital Data, Proc. Advances in Cryptology - Crypto'95, LNCS 96, Springer, pp. 452-465, 1995. Full paper available: http://www cs.princeton edu/dabo/publications.html
    • (1995) Proc. Advances in Cryptology - Crypto'95 , vol.96 , pp. 452-465
    • Boneh, D.1    Shaw2
  • 9
    • 0022199386 scopus 로고
    • Verifiable secret sharing and achieving simultaneity in the presence of faults
    • B. Chor and S Goldwasser and S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, FOCS 85, 1985, pp. 383-395.
    • (1985) FOCS , vol.85 , pp. 383-395
    • Chor, B.1    Goldwasser, S.2    Micali, S.3    Awerbuch, B.4
  • 13
    • 0023538330 scopus 로고
    • A practical scheme for non-interactive verifiable secret sharing
    • P. Feldman, A practical scheme for non-interactive verifiable secret sharing, FOCS 28, 1987, pp. 427-437.
    • (1987) FOCS , vol.28 , pp. 427-437
    • Feldman, P.1
  • 15
    • 85034864010 scopus 로고
    • Towards a theory of software protection
    • Springer-Verlag
    • O. Goldreich, Towards a Theory of Software Protection, Advances in Cryptology - CRYPTO 1986, Springer-Verlag, 1987, pp. 426-439.
    • (1987) Advances in Cryptology - CRYPTO 1986 , pp. 426-439
    • Goldreich, O.1
  • 24
    • 0024768554 scopus 로고
    • On universal classes of fast high performance hash functions, their time-space tradeoff and their applications
    • A. Siegel, On universal classes of fast high performance hash functions, their time-space tradeoff and their applications, FOCS 1989, pp. 20-25
    • (1989) FOCS , pp. 20-25
    • Siegel, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.