-
1
-
-
0025246897
-
A Fair Protocol for Signing Contracts
-
M. Ben-Or, O. Goldreich, S. Micali, and R.L. Rivest, "A Fair Protocol for Signing Contracts," IEEE Trans. Information Theory, vol. 36, no. 1, pp. 40-46, 1990.
-
(1990)
IEEE Trans. Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
4
-
-
0033157443
-
MagNET: Mobile Agents for Networked Electronic Trading
-
May/June
-
P. Dasgupta, N. Narasimhan, L.E. Moser, and P.M. Melliar-Smith, "MagNET: Mobile Agents for Networked Electronic Trading," IEEE Trans. Knowledge and Data Eng., vol. 11, no. 4, pp. 509-525, May/June 1999.
-
(1999)
IEEE Trans. Knowledge and Data Eng.
, vol.11
, Issue.4
, pp. 509-525
-
-
Dasgupta, P.1
Narasimhan, N.2
Moser, L.E.3
Melliar-Smith, P.M.4
-
8
-
-
84874800178
-
A Public-Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms
-
T. ElGamal, "A Public-Key CryptoSystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. Information Theory, vol. 31, no. 4, pp. 469-472, 1985.
-
(1985)
IEEE Trans. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
10
-
-
0034314397
-
An Efficient Threshold Decryption Scheme without Session Keys
-
M.S. Hwang, C.C. Chang, and K.F. Hwang, "An Efficient Threshold Decryption Scheme without Session Keys," Computers & Electrical Eng., vol. 27, no. 1, pp. 29-35, 2000.
-
(2000)
Computers & Electrical Eng.
, vol.27
, Issue.1
, pp. 29-35
-
-
Hwang, M.S.1
Chang, C.C.2
Hwang, K.F.3
-
11
-
-
0036509730
-
An ElGamal-Like Cryptosystem for Enciphering Large Messages
-
M.S. Hwang, C.C. Chang, and K.F. Hwang, "An ElGamal-Like Cryptosystem for Enciphering Large Messages," IEEE Trans. Knowledge and Data Eng., vol. 14, no. 2, pp. 445-446, 2002.
-
(2002)
IEEE Trans. Knowledge and Data Eng.
, vol.14
, Issue.2
, pp. 445-446
-
-
Hwang, M.S.1
Chang, C.C.2
Hwang, K.F.3
-
12
-
-
0141518230
-
A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
-
M.S. Hwang, I.C. Lin, and E.J.L. Lu, "A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers," Int'l J. Information, vol. 11, no. 2, pp. 1-8, 2000.
-
(2000)
Int'l J. Information
, vol.11
, Issue.2
, pp. 1-8
-
-
Hwang, M.S.1
Lin, I.C.2
Lu, E.J.L.3
-
13
-
-
0010567510
-
Proxy Signatures, Revisited
-
S. Kim, S. Park, and D. Won, "Proxy Signatures, Revisited," Proc. Int'l Conf. Information Security and Comm. Security (ICICS '97), pp. 223-232, 1997.
-
(1997)
Proc. Int'l Conf. Information Security and Comm. Security (ICICS '97)
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
14
-
-
84958751721
-
Secure Mobile Agent Using Strong Non-Designated Proxy Signature
-
Springer Verlag
-
B. Lee, H. Kim, and K. Kim, "Secure Mobile Agent Using Strong Non-Designated Proxy Signature," Lecture Notes in Computer Science-Information Security and Privacy, vol. 2119, Springer Verlag, pp. 474-486, 2001.
-
(2001)
Lecture Notes in Computer Science-information Security and Privacy
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
15
-
-
84956860632
-
On Zhang's Nonrepudiable Proxy Signature Schemes
-
N.Y. Lee, T. Hwang, and C.H. Wang, "On Zhang's Nonrepudiable Proxy Signature Schemes," Proc. Australasian Conf. Information Security and Privacy (ACISP '98), pp. 415-422, 1998.
-
(1998)
Proc. Australasian Conf. Information Security and Privacy (ACISP '98)
, pp. 415-422
-
-
Lee, N.Y.1
Hwang, T.2
Wang, C.H.3
-
16
-
-
0030231965
-
Proxy Signatures: Delegation of the Power to Sign Message
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy Signatures: Delegation of the Power to Sign Message," IEICE Trans. Fundamentals, vol. E79-A, no. 9, pp. 1338-1354, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
17
-
-
0029717329
-
Proxy Signatures for Delegating Signing Operation
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy Signatures for Delegating Signing Operation," Proc. Third ACM Conf. Computer and Comm. Security, pp. 48-57, 1996.
-
(1996)
Proc. Third ACM Conf. Computer and Comm. Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
18
-
-
0027316628
-
Proxy-Based Authorization and Accounting for Distributed Systems
-
B.C. Neuman, "Proxy-Based Authorization and Accounting for Distributed Systems," Proc. 13th Int'l Conf. Distributed Systems, pp. 283-291, 1993.
-
(1993)
Proc. 13th Int'l Conf. Distributed Systems
, pp. 283-291
-
-
Neuman, B.C.1
-
19
-
-
0034264732
-
Mobile Agent for World Wide Web Distributed Database Access
-
S. Papastavrou, G. Samaras, and E. Pitoura, "Mobile Agent for World Wide Web Distributed Database Access," IEEE Trans. Knowledge and Data Eng., vol. 12, no. 5, pp. 802-820, 2000.
-
(2000)
IEEE Trans. Knowledge and Data Eng.
, vol.12
, Issue.5
, pp. 802-820
-
-
Papastavrou, S.1
Samaras, G.2
Pitoura, E.3
-
20
-
-
84876222959
-
Distributed Provers with Applications to Undeniable Signatures
-
T. Pedersen, "Distributed Provers with Applications to Undeniable Signatures," Proc. Advance in Cryptology (Eurocrypt '91), pp. 221-238, 1991.
-
(1991)
Proc. Advance in Cryptology (Eurocrypt '91)
, pp. 221-238
-
-
Pedersen, T.1
-
21
-
-
85030460443
-
A Threshold Cryptosystem without a Trusted Party
-
T.P. Pedersen, "A Threshold Cryptosystem without a Trusted Party," Proc. Eurocrypt '91, pp. 522-526, 1991.
-
(1991)
Proc. Eurocrypt '91
, pp. 522-526
-
-
Pedersen, T.P.1
-
22
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Feb
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Comm. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
23
-
-
0032670844
-
An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
-
H.-M. Sun, "An Efficient Nonrepudiable Threshold Proxy Signature Scheme with Known Signers," Computer Comm., vol. 22, no. 8, pp. 717-722, 1999.
-
(1999)
Computer Comm.
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.-M.1
-
24
-
-
0029752886
-
Proposal of an Automatic Signature Scheme Using a Compiler
-
K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, "Proposal of an Automatic Signature Scheme Using a Compiler," IEICE Trans. fundamentals, vol. E79-A, no. 1, pp. 94-101, 1996.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.1
, pp. 94-101
-
-
Usuda, K.1
Mambo, M.2
Uyematsu, T.3
Okamoto, E.4
-
25
-
-
0026156775
-
An Analysis of the Proxy Problem in Distributed Systems
-
V. Varabharajan, P. Allen, and S. Black, "An Analysis of the Proxy Problem in Distributed Systems," Proc. 1991 IEEE CS Symp. Research in Security and Privacy, pp. 225-275, 1991.
-
(1991)
Proc. 1991 IEEE CS Symp. Research in Security and Privacy
, pp. 225-275
-
-
Varabharajan, V.1
Allen, P.2
Black, S.3
|