메뉴 건너뛰기




Volumn 1, Issue 3, 1997, Pages 87-89

An authentication protocol without trusted third party

Author keywords

Authentication protocol; ID based scheme

Indexed keywords

COMPUTATIONAL COMPLEXITY; CRYPTOGRAPHY; FUNCTIONS; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0031143361     PISSN: 10897798     EISSN: None     Source Type: Journal    
DOI: 10.1109/4234.585805     Document Type: Article
Times cited : (27)

References (4)
  • 2
    • 0024612164 scopus 로고
    • Identity-based information security management system for personal computer networks
    • Feb.
    • E. Okamoto and K. Tanaka, "Identity-based information security management system for personal computer networks," IEEE J. Select. Areas Commun., vol. 7, pp. 290-294, Feb. 1989.
    • (1989) IEEE J. Select. Areas Commun. , vol.7 , pp. 290-294
    • Okamoto, E.1    Tanaka, K.2
  • 3
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Santa Barbara, CA
    • A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. Crypto-84, Santa Barbara, CA, 1984, pp. 47-53.
    • (1984) Proc. Crypto-84 , pp. 47-53
    • Shamir, A.1
  • 4
    • 0023451666 scopus 로고
    • ID-based cryptosystem using discrete logarithm problem
    • Nov.
    • S. Tsujii, T. Itho, and K. Kurosawa, "ID-based cryptosystem using discrete logarithm problem," Electron. Lett., vol. 23, pp. 1318-1320, Nov. 1987.
    • (1987) Electron. Lett. , vol.23 , pp. 1318-1320
    • Tsujii, S.1    Itho, T.2    Kurosawa, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.