메뉴 건너뛰기




Volumn 13, Issue 1, 1997, Pages 65-74

Multi-application smart cards and encrypted data, processing

Author keywords

Cryptographic protocols for smart cards; Multi application smart cards; Smart cards architecture and techniques

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER OPERATING SYSTEMS; CRYPTOGRAPHY; DATA PROCESSING; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 0031176117     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-739X(97)89112-1     Document Type: Article
Times cited : (9)

References (16)
  • 1
    • 0023408117 scopus 로고
    • Processing encrypted data
    • N. Ahituv, Y. Lapid and S. Neumann, Processing encrypted data, Comm. ACM. 20 (1987) 777-780.
    • (1987) Comm. ACM , vol.20 , pp. 777-780
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 2
    • 0039158316 scopus 로고    scopus 로고
    • How smart cards can take benefits from object-oriented technologies
    • Amsterdam, Netherlands
    • P. Biget, P. George and J.-J. Vandewalle, How smart cards can take benefits from object-oriented technologies, Proc. CARDIS'96 (Amsterdam, Netherlands, 1996) 175-194.
    • (1996) Proc. CARDIS'96 , pp. 175-194
    • Biget, P.1    George, P.2    Vandewalle, J.-J.3
  • 3
    • 0005971167 scopus 로고
    • Network objects
    • February
    • A. Birell, G. Nelson, S. Owicki and E. Wobber, Network objects, DEC SRC Report no. 115, February 1994; also in: Proc 14th ACM Symp. on Operating System Principles (Asheville, NC, 1993).
    • (1994) DEC SRC Report , vol.115
    • Birell, A.1    Nelson, G.2    Owicki, S.3    Wobber, E.4
  • 4
    • 0040936794 scopus 로고
    • Asheville, NC
    • A. Birell, G. Nelson, S. Owicki and E. Wobber, Network objects, DEC SRC Report no. 115, February 1994; also in: Proc 14th ACM Symp. on Operating System Principles (Asheville, NC, 1993).
    • (1993) Proc 14th ACM Symp. on Operating System Principles
  • 5
    • 0040342829 scopus 로고
    • Network objects
    • revised December
    • A. Birell, G. Nelson, S. Owicki and E. Wobber, Network objects, DEC SRC Report no. 115, revised December 1995; also in: Software-Practice Experience, to appear.
    • (1995) DEC SRC Report , vol.115
    • Birell, A.1    Nelson, G.2    Owicki, S.3    Wobber, E.4
  • 6
    • 85030056859 scopus 로고    scopus 로고
    • to appear
    • A. Birell, G. Nelson, S. Owicki and E. Wobber, Network objects, DEC SRC Report no. 115, revised December 1995; also in: Software-Practice Experience, to appear.
    • Software-Practice Experience
  • 7
    • 85034827254 scopus 로고
    • On privacy homomorphisms
    • eds. D. Chaum and W. L. Price, Springer, Berlin
    • E. Brickell and Y. Yacobi, On privacy homomorphisms, in: Advances in Cryptology-Eurocrypt'87 eds. D. Chaum and W. L. Price, (Springer, Berlin, 1988) 117-125.
    • (1988) Advances in Cryptology-Eurocrypt'87 , pp. 117-125
    • Brickell, E.1    Yacobi, Y.2
  • 9
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • J. Domingo-Ferrer, A new privacy homomorphism and applications, Inform. Process. Lett. 60 (1996) 277-282.
    • (1996) Inform. Process. Lett. , vol.60 , pp. 277-282
    • Domingo-Ferrer, J.1
  • 10
    • 0039158318 scopus 로고    scopus 로고
    • An unconditionally secure additive and multiplicative privacy homomorphism
    • submitted
    • J. Domingo-Ferrer, An unconditionally secure additive and multiplicative privacy homomorphism, IEEE Trans. Inorm. Theory (1996), submitted.
    • (1996) IEEE Trans. Inorm. Theory
    • Domingo-Ferrer, J.1
  • 13
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • eds. R.A. DeMillo et al. Academic Press, New York
    • R.L. Rivest, L. Adleman and M.L. Dertouzos, On data banks and privacy homomorphisms, in: Foundations of Secure Computation, eds. R.A. DeMillo et al. (Academic Press, New York, 1978) 169-179.
    • (1978) Foundations of Secure Computation , pp. 169-179
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 14
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Comm. ACM 21 (1978) 120-126.
    • (1978) Comm. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.