-
2
-
-
0038629674
-
Simple Public Key Infrastructure (SPKI) charter
-
S. Bellovin and P. Metzger. Simple Public Key Infrastructure (SPKI) Charter. http://www.ietf.org/html.charters/spki-charter.html.
-
-
-
Bellovin, S.1
Metzger, P.2
-
3
-
-
84957800809
-
Keynote: Trust management for public-key infrastructures
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. Keynote: Trust management for public-key infrastructures. In 1998 Security Protocols International Workshop, vol. 1550 of LNCS, pp. 59-63, 1998.
-
(1998)
1998 Security Protocols International Workshop, Vol. 1550 of LNCS
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
4
-
-
0029700344
-
Decentralized trust management. Research in security and privacy
-
IEEE Computer Society, Technical Committee on Security and Privacy
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. Research in Security and Privacy, 1996. IEEE Computer Society, Technical Committee on Security and Privacy.
-
(1996)
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
4243626566
-
Key management, setup and implementation of an anonymous credential system
-
Master's thesis
-
M. Bove. Key management, setup and implementation of an anonymous credential system. Master's thesis, 2001.
-
(2001)
-
-
Bove, M.1
-
6
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Springer Verlag
-
J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT 2001, vol. 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.
-
(2001)
EUROCRYPT 2001, Vol. 2045 of LNCS
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
9
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
Springer-Verlag
-
D. Chaum and J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between organizations. In CRYPTO '86, vol. 263 of LNCS, pp. 118-167. Springer-Verlag, 1987.
-
(1987)
CRYPTO '86, Vol. 263 of LNCS
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
10
-
-
84929273746
-
Untraceable electronic cash
-
Springer Verlag
-
D. Chaum, A. Fiat, and M. Naor. Untraceable electronic cash. In CRYPTO '88, vol. 403 of LNCS, pp. 319-327. Springer Verlag, 1990.
-
(1990)
CRYPTO '88, Vol. 403 of LNCS
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
11
-
-
0011917214
-
-
Consultation Committee; International Telephone and Telegraph, International Telecommunications Union, Geneva
-
Consultation Committee. X.509: The Directory Authentication Framework. International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989.
-
(1989)
X.509: The Directory Authentication Framework
-
-
-
12
-
-
85031802442
-
Payment systems and credential mechanism with provable security against abuse by individuals
-
Springer Verlag
-
I. B. Damgård. Payment systems and credential mechanism with provable security against abuse by individuals. In CRYPTO '88, vol. 403 of LNCS, pp. 328-335. Springer Verlag, 1990.
-
(1990)
CRYPTO '88, Vol. 403 of LNCS
, pp. 328-335
-
-
Damgård, I.B.1
-
13
-
-
0037953375
-
Digital signets: Self-enforcing protection of digital information
-
C. Dwork, J. Lotspiech, and M. Naor. Digital signets: Self-enforcing protection of digital information. 1996.
-
(1996)
-
-
Dwork, C.1
Lotspiech, J.2
Naor, M.3
-
14
-
-
0038629677
-
-
KeyMan
-
T. Eirich. KeyMan. http://www.alphaworks.ibm.com/tech/keyman.
-
-
-
Eirich, T.1
-
15
-
-
0003593599
-
-
Internet Engineering Task Force RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. Internet Engineering Task Force RFC 2693.
-
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
16
-
-
84990731886
-
How to prove yourself: Practical solution to identification and signature problems
-
Springer Verlag
-
A. Fiat and A. Shamir. How to prove yourself: Practical solution to identification and signature problems. In CRYPTO '86, vol. 263 of LNCS, pp. 186-194. Springer Verlag, 1987.
-
(1987)
CRYPTO '86, Vol. 263 of LNCS
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
17
-
-
84957707067
-
Self-delegation with controlled propagation - Or - What if you lose your laptop
-
Springer Verlag
-
O. Goldreich, B. Pfitzman, and R. Rivest. Self-delegation with controlled propagation - or - what if you lose your laptop. In CRYPTO '98, vol. 1642 of LNCS, pp. 153-168, 1998. Springer Verlag.
-
(1998)
CRYPTO '98, Vol. 1642 of LNCS
, pp. 153-168
-
-
Goldreich, O.1
Pfitzman, B.2
Rivest, R.3
-
18
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
February
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2):84-88, February 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 84-88
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
19
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Press
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 2-14, 2000. IEEE Press.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
23
-
-
0035751908
-
Distributed credential chain discovery in trust management: Extended abstract
-
ACM Press
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management: extended abstract. In 8th ACM CCS, pp. 156-165. ACM Press, 2001.
-
(2001)
8th ACM CCS
, pp. 156-165
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
24
-
-
0037615403
-
Pseudonym systems
-
A. Lysyanskaya, R. Rivest, A. Sahai, and S. Wolf. Pseudonym systems. In Selected Areas in Cryptography, vol. 1758 of LNCS, 1999.
-
(1999)
Selected Areas in Cryptography, Vol. 1758 of LNCS
-
-
Lysyanskaya, A.1
Rivest, R.2
Sahai, A.3
Wolf, S.4
-
25
-
-
4244037749
-
New idemix client handbuch
-
Technical report, December
-
R. Mathys. New idemix client handbuch. Technical report, December 2001.
-
(2001)
-
-
Mathys, R.1
-
26
-
-
0003056522
-
Isdnmixes: Untraceable communication with very small bandwidth overhead
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead, 1991.
-
(1991)
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
28
-
-
0005072366
-
Unlinable serial transactions: Protocols and applications
-
Nov.
-
S. G. Stubblebine, P. F. Syverson, and D. M. Goldschlag. Unlinable serial transactions: Protocols and applications. ACM Transactions on Information and System Security, 2(4):354-389, Nov. 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.4
, pp. 354-389
-
-
Stubblebine, S.G.1
Syverson, P.F.2
Goldschlag, D.M.3
|