메뉴 건너뛰기




Volumn , Issue , 1998, Pages

On secure and pseudonymous client-relationships with multiple servers

Author keywords

[No Author keywords available]

Indexed keywords

ENGINES;

EID: 1642335071     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (25)
  • 1
    • 0012341121 scopus 로고
    • The classification of hash func-tions
    • De-cember
    • R. Anderson, The classification of hash func-tions. Cryptography and Coding IV, pp. 83-94, De-cember 1993.
    • (1993) Cryptography and Coding IV , pp. 83-94
    • Anderson, R.1
  • 2
    • 85084162426 scopus 로고    scopus 로고
    • Security of web browser scripting languages: Vulnerabilities, at-tacks, and remedies
    • V. Anupam, A. Mayer, Security of web browser scripting languages: Vulnerabilities, at-tacks, and remedies. In Proc. 7th USENIX Security Symposium, 1998.
    • (1998) Proc. 7th USENIX Security Symposium
    • Anupam, V.1    Mayer, A.2
  • 3
    • 85094860360 scopus 로고    scopus 로고
    • The Anonymizer
    • The Anonymizer. http://www.anonym-izer.com.
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Communica-tions of the ACM, 24(2), 1981, pp. 84-88.
    • (1981) Communica-tions of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obso-lete
    • Octo-ber
    • D. Chaum, Security without identification: Transaction systems to make big brother obso-lete. Communications of the ACM, 28(10), Octo-ber 1985, pp. 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 10
    • 0003317098 scopus 로고    scopus 로고
    • How to make personalized web brows-ing simple, secure, and anonymous
    • Springer-Verlag LNCS 1318
    • E. Gabber, P.B. Gibbons, Y. Matias, A. Mayer, How to make personalized web brows-ing simple, secure, and anonymous. Financial Cryptography'97, Springer-Verlag LNCS 1318.
    • Financial Cryptography'97
    • Gabber, E.1    Gibbons, P.B.2    Matias, Y.3    Mayer, A.4
  • 15
    • 85028910917 scopus 로고    scopus 로고
    • Markov ciphers and dif-ferential cryptanalysis
    • Springer Verlag LNCS
    • X. Lai, J. Massey, Markov ciphers and dif-ferential cryptanalysis. In Proc. EUROCRYPT'91, Springer Verlag LNCS 437, pp. 17-38.
    • Proc. EUROCRYPT'91 , vol.437 , pp. 17-38
    • Lai, X.1    Massey, J.2
  • 18
    • 51549120471 scopus 로고    scopus 로고
    • MDx-MAC and building fast MACs from hash functions
    • Springer-Verlag LNCS
    • B. Preneel, P.C. van Oorschot, MDx-MAC and building fast MACs from hash functions. Crypto'95, Springer-Verlag LNCS 963, pp. 1-14.
    • Crypto'95 , vol.963 , pp. 1-14
    • Preneel, B.1    van Oorschot, P.C.2
  • 19
    • 84937555451 scopus 로고    scopus 로고
    • Networks with-out user observability-design options. Euro-crypt'85
    • Springer-Verlag LNCS
    • A. Pfitzmann, M. Waidner, Networks with-out user observability-design options. Euro-crypt'85, Springer-Verlag LNCS 219, pp. 245-253.
    • , vol.219 , pp. 245-253
    • Pfitzmann, A.1    Waidner, M.2
  • 21
    • 84948990100 scopus 로고
    • The RC5 encryption algorithm
    • Springer Verlag LNCS
    • R. Rivest, The RC5 encryption algorithm. Fast Software Encryption, Springer Verlag LNCS 1008, pp. 86-96, 1995.
    • (1995) Fast Software Encryption , vol.1008 , pp. 86-96
    • Rivest, R.1
  • 23
    • 24344440124 scopus 로고    scopus 로고
    • Anonymous communication and anonymous cash
    • Springer Verlag LNCS
    • D. Simon, Anonymous communication and anonymous cash. Crypto'96, Springer Verlag LNCS 1109, pp. 61-73.
    • Crypto'96 , vol.1109 , pp. 61-73
    • Simon, D.1
  • 25
    • 85094868171 scopus 로고    scopus 로고
    • ssl-faq at http://www.consensus.com/ security/ssl-Talk-sec03.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.