-
1
-
-
0004055363
-
Showing Credentials without Identification: Signature Transferred between Unconditionally Unlinkable Pseudonyms
-
New York, Springer-Verlag
-
D Chaum Showing Credentials without Identification: Signature Transferred between Unconditionally Unlinkable Pseudonyms. Advances in Cryptography, Eurocrypt'85, New York, Springer-Verlag, pp. 241-244
-
Advances in Cryptography, Eurocrypt'85
, pp. 241-244
-
-
Chaum, D.1
-
2
-
-
0024903684
-
Password Authentication Using Public Key Cryptography
-
L Harn, D Huang and C S Laih Password Authentication Using Public Key Cryptography. Comput. Math. Applic., Vol. 18, No. 12, 1989, pp. 1001-1017
-
(1989)
Comput. Math. Applic.
, vol.18
, Issue.12
, pp. 1001-1017
-
-
Harn, L.1
Huang, D.2
Laih, C.S.3
-
3
-
-
0027807653
-
Key Management for Decentralized Computer Network Services
-
December
-
L Harn and H Y Lin Key Management for Decentralized Computer Network Services. IEEE Trans. on Comm., Vol. 41, No. 12, December 1993, pp. 1777-1779
-
(1993)
IEEE Trans. on Comm.
, vol.41
, Issue.12
, pp. 1777-1779
-
-
Harn, L.1
Lin, H.Y.2
-
4
-
-
0024641617
-
Key Changeable ID-Based Cryptosystem
-
April
-
K Kurosawa Key Changeable ID-Based Cryptosystem. Electron. Lett., Vol. 25, No. 9, April 1989, pp. 577-578
-
(1989)
Electron. Lett.
, vol.25
, Issue.9
, pp. 577-578
-
-
Kurosawa, K.1
-
6
-
-
0024612164
-
Identity-Based Information Security Management System for Personal Computer Networks
-
February
-
E Okamoto and K Tanaka Identity-Based Information Security Management System for Personal Computer Networks. IEEE Journal on Selected Areas in Communications, Vol. 7, No. 2, February 1989, pp. 290-294
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.2
, pp. 290-294
-
-
Okamoto, E.1
Tanaka, K.2
-
7
-
-
12944273449
-
Membership Authentication for Hierarchical Multigroups Using a Master Secret Key
-
July
-
K Otha and T Okamoto Membership Authentication for Hierarchical Multigroups Using a Master Secret Key. Trans. IEICE, Vol. E 73, No. 7, July 1990, pp. 1107-1110
-
(1990)
Trans. IEICE
, vol.73 E
, Issue.7
, pp. 1107-1110
-
-
Otha, K.1
Okamoto, T.2
-
8
-
-
0016090968
-
A High Security Login Procedure
-
August
-
GB Purdy A High Security Login Procedure. Comm. ACM, Vol. 17, No. 8, August 1974, pp. 442-445
-
(1974)
Comm. ACM
, vol.17
, Issue.8
, pp. 442-445
-
-
Purdy, G.B.1
-
9
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystem
-
February
-
RL Rivest, A Shatmir and L Adelman A Method for Obtaining Digital Signatures and Public-Key Cryptosystem. Commun. of ACM, Vol. 21, No. 2, February 1987, pp. 120-126
-
(1987)
Commun. of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shatmir, A.2
Adelman, L.3
-
10
-
-
85020598353
-
Identity-Based Cryptosystem and Signature Schemes
-
Santa Barbara, CA, August 19-22
-
A Shamir Identity-Based Cryptosystem and Signature Schemes. Proc. Crypto'84, Santa Barbara, CA, August 19-22 1984, pp. 47-53
-
(1984)
Proc. Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
11
-
-
0000537828
-
Efficient Identification and Signature for Smart Cards
-
Santa Barbara, CA, August 20-24
-
C P Schnorr Efficient Identification and Signature for Smart Cards. Advanced in Cryptology - CRYPTO'89, Santa Barbara, CA, August 20-24 1989, pp. 239-252
-
(1989)
Advanced in Cryptology - CRYPTO'89
, pp. 239-252
-
-
Schnorr, C.P.1
|