메뉴 건너뛰기




Volumn 10, Issue 3, 2002, Pages 273-296

Eliminating counterevidence with applications to accountable certificate management

Author keywords

Accountable certificate management; Attesters; Authenticated search trees; Long term authenticity; Non repudiation; Public key infrastructure; Search trees; Time stamping

Indexed keywords

ALGORITHMS; NETWORK PROTOCOLS; PROGRAM DOCUMENTATION; PUBLIC KEY CRYPTOGRAPHY;

EID: 0036312254     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2002-10304     Document Type: Conference Paper
Times cited : (36)

References (30)
  • 2
    • 85012908743 scopus 로고
    • One-way accumulators: A decentralized alternative to digital signatures
    • Advances in Cryptology - EUROCRYPT '93, T. Helleseth, ed., Lofthus, Norway, Springer-Verlag, ISBN 3-540-57600-2
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 274-285
    • Benaloh, J.1    De Mare, M.2
  • 9
    • 84957360970 scopus 로고    scopus 로고
    • Collision-free accumulators and fail-stop signature schemes without trees
    • Advances on Cryptology - EUROCRYPT '97, W. Fumy, ed., Konstanz, Germany, Springer-Verlag, ISBN 3-540-62975-0
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 480-494
    • Barić, N.1    Pfitzmann, B.2
  • 11
  • 18
    • 84958063551 scopus 로고    scopus 로고
    • On certificate revocation and validation
    • Financial Cryptography - Second International Conference, R. Hirschfeld, ed., Anguilla, British West Indies, Springer-Verlag
    • (1998) Lecture Notes in Computer Science , vol.1465 , pp. 172-177
    • Kocher, P.1
  • 28
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate revocation lists?
    • Financial Cryptography - Second International Conference, R. Hirschfeld, ed., Anguilla, British West Indies, Springer-Verlag
    • (1998) Lecture Notes in Computer Science , vol.1465 , pp. 178-183
    • Rivest, R.L.1
  • 29
    • 84958644864 scopus 로고    scopus 로고
    • Efficient accumulators without trapdoor
    • The Second International Conference on Information and Communication Security, V. Varadharajan and Y. Mu, eds, Sydney, Australia, Springer-Verlag, ISBN 3-540-66682-6
    • (1999) Lecture Notes in Computer Science , vol.1726 , pp. 252-262
    • Sander, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.