-
1
-
-
0012164995
-
Who's got the key?
-
Denver, Colorado, United States
-
D. Henry, "Who's got the key?", Proceedings of the 27th annual ACM SIGUCCS conference on User services: Mile high expectations, Denver, Colorado, United States, 1999, pp. 106-110.
-
(1999)
Proceedings of the 27th Annual ACM SIGUCCS Conference on User Services: Mile High Expectations
, pp. 106-110
-
-
Henry, D.1
-
2
-
-
0034471216
-
Anonymous public-key certificates for anonymous and fair document exchange
-
N. Zhang, Q. Shi and M. Merabti, "Anonymous public-key certificates for anonymous and fair document exchange", IEE Proceedings in Communications, 2000, 147(6), 345-350.
-
(2000)
IEE Proceedings in Communications
, vol.147
, Issue.6
, pp. 345-350
-
-
Zhang, N.1
Shi, Q.2
Merabti, M.3
-
3
-
-
84958056811
-
Revocation: Options and challenges
-
Michael Myers, "Revocation: Options and Challenges", FC'98, LNCS 1465, 1998, pp. 165-171.
-
(1998)
FC'98, LNCS
, vol.1465
, pp. 165-171
-
-
Myers, M.1
-
4
-
-
3242880752
-
Digital certificates: A survey of revocation methods
-
Los Angeles, California, United States
-
Petra Wohlmacher, "Digital Certificates: A Survey of Revocation Methods", Proceedings of the 2000 ACM Workshops on Multimedia 2000, Los Angeles, California, United States, 2000, pp. 111-114.
-
(2000)
Proceedings of the 2000 ACM Workshops on Multimedia 2000
, pp. 111-114
-
-
Wohlmacher, P.1
-
7
-
-
84902482761
-
Certificate revocation the responsible way
-
IEEE
-
J.K. Millen and R.N. Wright, "Certificate Revocation the Responsible Way", Proceedings of Computer Security, Dependability and Assurance: From Needs to Solutions, CSDA '98, IEEE, 1998, pp. 196-203.
-
(1998)
Proceedings of Computer Security, Dependability and Assurance: from Needs to Solutions, CSDA '98
, pp. 196-203
-
-
Millen, J.K.1
Wright, R.N.2
-
8
-
-
0033885757
-
Windowed Certificate Revocation
-
26-30 Mar
-
P. McDaniel and S. Jamin, "Windowed Certificate Revocation", Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2000, Vol.3, 26-30 Mar 2000, pp. 1406-1414.
-
(2000)
Proceedings of the Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2000
, vol.3
, pp. 1406-1414
-
-
McDaniel, P.1
Jamin, S.2
-
10
-
-
23044519211
-
Distributed storage and revocation in digital certificate databases
-
J. Lopez et al., "Distributed Storage and Revocation in Digital Certificate Databases", DEXA 2000, LNCS 1873, 2000, pp. 929-938.
-
(2000)
DEXA 2000, LNCS
, vol.1873
, pp. 929-938
-
-
Lopez, J.1
-
11
-
-
84958042111
-
Can we eliminate certificate revocation lists?
-
R.L. Rivest, "Can We Eliminate Certificate Revocation Lists?", FC'98, LNCS 1465, 1998, pp. 178-183.
-
(1998)
FC'98, LNCS
, vol.1465
, pp. 178-183
-
-
Rivest, R.L.1
-
12
-
-
84949191488
-
Nonmonotonicity, user interfaces, and risk assessment in certificate revocation (position paper)
-
N. Li and J. Feigenbaum, "Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation (Position Paper)", FC 2001, LNCS 2339, 2002, pp. 166-177.
-
(2002)
FC 2001, LNCS
, vol.2339
, pp. 166-177
-
-
Li, N.1
Feigenbaum, J.2
-
13
-
-
23044531736
-
Key revocation with interval cover families
-
J. Blomer and A. May, "Key Revocation with Interval Cover Families", SAC 2001, LNCS 2259, 2001, pp. 325-341.
-
(2001)
SAC 2001, LNCS
, vol.2259
, pp. 325-341
-
-
Blomer, J.1
May, A.2
-
14
-
-
84957678021
-
Fast digital identity revocation
-
W. Aiello, S. Lodha and R. Ostrovsky, "Fast Digital Identity Revocation", CRYPTO'98, LNCS 1462, 1998, pp. 137-153.
-
(1998)
CRYPTO'98, LNCS
, vol.1462
, pp. 137-153
-
-
Aiello, W.1
Lodha, S.2
Ostrovsky, R.3
-
15
-
-
84958063551
-
On certificate revocation and validation
-
P.C. Kocher, "On Certificate Revocation and Validation", FC'98, LNCS 1465, 1998, pp. 172-177
-
(1998)
FC'98, LNCS
, vol.1465
, pp. 172-177
-
-
Kocher, P.C.1
-
17
-
-
22844454009
-
Performance evaluation of certificate revocation using k-valued hash tree
-
H. Kikuchi, K. Abe and S. Nakanishi, "Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree", ISW'99, LNCS 1729, 1999, pp. 103-117.
-
(1999)
ISW'99, LNCS
, vol.1729
, pp. 103-117
-
-
Kikuchi, H.1
Abe, K.2
Nakanishi, S.3
-
18
-
-
0034449541
-
Accountable certificate management using undeniable attestations
-
Athens, Greece
-
A. Buldas, P. Laud and H. Lipman, "Accountable Certificate Management using Undeniable Attestations", Proceedings of the 7th ACM conference on Computer and communications security, Athens, Greece, 2000, pp. 9-17.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 9-17
-
-
Buldas, A.1
Laud, P.2
Lipman, H.3
-
19
-
-
0033733822
-
Certificate revocation and certificate update
-
Apr
-
M. Naor and K. Nissim, "Certificate Revocation and Certificate Update", IEEE Journal on Selected Areas in Communications, Vol.18, Iss.4, Apr 2000. pp. 561-570.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
, pp. 561-570
-
-
Naor, M.1
Nissim, K.2
-
20
-
-
84883865377
-
Security aspects in standard certificate revocation mechanisms: A case study for OCSP
-
IEEE
-
D. Berbecura, A. Lioy, M. Marian, "Security Aspects in Standard Certificate Revocation Mechanisms: A Case Study for OCSP", Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002, IEEE, 2002, pp. 484- 489.
-
(2002)
Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002
, pp. 484-489
-
-
Berbecura, D.1
Lioy, A.2
Marian, M.3
-
21
-
-
84883881376
-
A flexible scheme for on-line public-key certificate status updating and verification
-
IEEE
-
E. Faldella and M. Prandini, "A Flexible Scheme for On-line Public-key Certificate Status Updating and Verification", Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002, IEEE, 2002, pp. 891-898.
-
(2002)
Proceedings of the Seventh International Symposium on Computers and Communications, ISCC 2002
, pp. 891-898
-
-
Faldella, E.1
Prandini, M.2
-
22
-
-
84949523659
-
A novel approach to on-line status authentication of public-key certificates
-
IEEE, Dec
-
E. Faldella and M. Prandini, "A Novel Approach to On-line Status Authentication of Public-key Certificates", Proceedings of the 16th Annual Conference on Computer Security Applications, ACSAC '00, IEEE, Dec 2000, pp. 270-277.
-
(2000)
Proceedings of the 16th Annual Conference on Computer Security Applications, ACSAC '00
, pp. 270-277
-
-
Faldella, E.1
Prandini, M.2
-
23
-
-
0038687775
-
Design and implementation of the idemix anonymous credential systems
-
November 18-22
-
Jan Camenisch and Els Van Herreweghen, "Design and Implementation of the idemix Anonymous Credential Systems", Proceedings of the 9th ACM conference on Computer and communications security, CCS'02, November 18-22, 2002, pp. 21-30.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS'02
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
24
-
-
84945135810
-
Efficient non-transfereable anonymous multi-show credential system with optional anonymity revocation
-
Jan Camenisch and Anna Lysyanskaya, "Efficient non-transfereable anonymous multi-show credential system with optional anonymity revocation, " EUROCRYPT 2001, LNCS 2045, 2001, pp. 93-118.
-
(2001)
EUROCRYPT 2001, LNCS
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
25
-
-
84937428748
-
Accumulators and application to efficient revocation of anonymous credentials
-
Jan Camenisch and Anna Lysyanskaya, "Accumulators and Application to Efficient Revocation of Anonymous Credentials", CRYPTO 2002, LNCS 2442, 2002, pp. 61-76.
-
(2002)
CRYPTO 2002, LNCS
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
27
-
-
0032074579
-
Anonymous connections and onion routing
-
P.F. Syverson, M. G. Reed and D. M. Goldschlag, "Anonymous connections and onion routing", IEEE Journal on Selected Areas in Communications, 1998, 16(4), 482-494.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Syverson, P.F.1
Reed, M.G.2
Goldschlag, D.M.3
-
28
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
David Chaum, "Security without identification: Transaction systems to make big brother obsolete", Communications of the ACM, 1985, 28(10), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
29
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
Michael K. Reiter and Aviel D. Rubin, "Crowds: Anonymity for Web Transactions", ACM Transactions on Information and Systems Security, TISSEC, 1998, 1(1), 66-92.
-
(1998)
ACM Transactions on Information and Systems Security, TISSEC
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
|