-
1
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NEEDHAM, R.M., and SCIIROEDER, M.D.: 'Using encryption for authentication in large networks of computers', Commun. ACM, 1978, 21, (12), pp. 993-999
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Sciiroeder, M.D.2
-
2
-
-
0017018484
-
New directions in cryptography
-
DIFFIE, W., and HELLMAN, M.E.: 'New directions in cryptography', IEEE Trans., 1976, IT-22, pp. 644-654
-
(1976)
IEEE Trans.
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
3
-
-
1542593353
-
Authentication and authenticated key exchanges
-
DIFFIE, W., VAN OORSCHOT, P., and WIENER, M.: 'Authentication and authenticated key exchanges', DCS. Codes, Crypogr., 1992, 2, pp. 107-125
-
(1992)
DCS. Codes, Crypogr.
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
4
-
-
0020180459
-
A conference key distribution system
-
INGEMARSSON, I., TANG, D., and WONG, C.: 'A conference key distribution system', IEEE Trans., 1982, IT-28, pp. 714-720
-
(1982)
IEEE Trans.
, vol.IT-28
, pp. 714-720
-
-
Ingemarsson, I.1
Tang, D.2
Wong, C.3
-
5
-
-
84979291225
-
Broadcast encryption
-
STINSON, D.R. (Ed.): Advances in cryptology-CRYPTO'93, Springer
-
FIAT, A., and NAOR, M.: 'Broadcast encryption', in STINSON, D.R. (Ed.): 'Advances in cryptology-CRYPTO'93, Lecture Notes in Computer Science No. 773 (Springer, 1994), pp. 480-491
-
(1994)
Lecture Notes in Computer Science No. 773
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
6
-
-
84948991087
-
A secure and efficient conference key distribution system
-
DE SANTIS, A. (Ed.): Advances in cryptology-EUROCRYPT'94, Springer
-
BURMESTER, M., and DESMEDT, Y.: 'A secure and efficient conference key distribution system', in DE SANTIS, A. (Ed.): 'Advances in cryptology-EUROCRYPT'94, Lecture Notes in Computer Science No. 950 (Springer, 1995), pp. 275-286
-
(1995)
Lecture Notes in Computer Science No. 950
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
7
-
-
84955559079
-
Authenticated multi-party key agreement
-
KIM, K. and MATSUMOTO, T. (Eds.): Advances in cryptology -ASIACRYPT'96', Springer
-
JUST, M., and VAUDENAY, S.: 'Authenticated multi-party key agreement', in KIM, K. and MATSUMOTO, T. (Eds.): 'Advances in cryptology -ASIACRYPT'96', Lecture Notes in Computer Science No. 1163 (Springer, 1996), pp. 36-19
-
(1996)
Lecture Notes in Computer Science No. 1163
, vol.1163
, pp. 36-119
-
-
Just, M.1
Vaudenay, S.2
-
9
-
-
0018545449
-
How to share a secret
-
SHAMIR, A.: 'How to share a secret', Commun. ACM, 1979, 22, pp. 612-613
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
10
-
-
0000708528
-
An explication of secret sharing schemes
-
STINSON, D.R.: 'An explication of secret sharing schemes', DCS. Codes Cryptogr., 1992, 2, pp. 357-390
-
(1992)
DCS. Codes Cryptogr.
, vol.2
, pp. 357-390
-
-
Stinson, D.R.1
-
11
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
COPPERSMITH, D. (Ed.): Advances in Cryptology -CRYPTO'95, Springer
-
HERZBERG, A., JARECKI, S., KRAWCZYK, H., and YUNG, M.: 'Proactive secret sharing or: how to cope with perpetual leakage', in COPPERSMITH, D. (Ed.): 'Advances in Cryptology -CRYPTO'95, Lecture Notes in Computer Science No. 963' (Springer, 1995), pp. 339-352
-
(1995)
Lecture Notes in Computer Science No. 963
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
12
-
-
84944878354
-
-
CRC Press, Boca Raton, Florida
-
MENEZES, A., VAN OORSCHOT, P., and VANSTONE, S.: 'Handbook of applied cryptography' (CRC Press, Boca Raton, Florida, 1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
14
-
-
84961340536
-
Changing thresholds in the absence of secure channel
-
Springer-Verlag, 1587
-
MARTIN, K., PIEPRZYK, J., SAFAVI-NAINI, R., and WANG, H.: 'Changing thresholds in the absence of secure channel'. Proceedings of the fourth Australasian conference on information Security and Privacy (ACISP99), 1999, Springer-Verlag, 1587, pp. 177-191
-
(1999)
Proceedings of the Fourth Australasian Conference on Information Security and Privacy (ACISP99)
, pp. 177-191
-
-
Martin, K.1
Pieprzyk, J.2
Safavi-Naini, R.3
Wang, H.4
|