메뉴 건너뛰기




Volumn 60, Issue 4, 2004, Pages 2621-2624

Computing of trust in wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

SCHNORR SIGNATURE; SIGNING ALGORITHM; SIMPLE PUBLIC-KEY INFRASTRUCTURE (SPKI); WIRELESS NETWORKS;

EID: 17144420084     PISSN: 15502252     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (24)

References (18)
  • 2
    • 84982994153 scopus 로고    scopus 로고
    • Distributed access-rights managements with delegations certificates
    • Tuomas Aura: Distributed Access-Rights Managements with Delegations Certificates. Secure Internet Programming 1999: 211-235.
    • (1999) Secure Internet Programming , pp. 211-235
    • Aura, T.1
  • 3
    • 84956868429 scopus 로고    scopus 로고
    • Fast access control decisions from delegation certificate databases
    • Tuomas Aura: Fast Access Control Decisions from Delegation Certificate Databases. ACISP 1998: 284-295.
    • (1998) ACISP , pp. 284-295
    • Aura, T.1
  • 4
    • 0031641091 scopus 로고    scopus 로고
    • On the structure of delegation networks
    • Tuomas Aura: On the Structure of Delegation Networks. CSFW 1998: 14-26.
    • (1998) CSFW , pp. 14-26
    • Aura, T.1
  • 7
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the PolicyMaker trust management system
    • Matt Blaze, Joan Feigenbaum, Martin Strauss: Compliance Checking in the PolicyMaker Trust Management System. Financial Cryptography 1998: 254-274.
    • (1998) Financial Cryptography , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 8
    • 84958235938 scopus 로고    scopus 로고
    • Trust management for IPsec
    • Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. TISSEC 5(2): 95-118 (2002).
    • (2002) TISSEC , vol.5 , Issue.2 , pp. 95-118
    • Blaze, M.1    Ioannidis, J.2    Keromytis, A.D.3
  • 10
    • 0033295882 scopus 로고    scopus 로고
    • The nature of a useable PKI
    • Carl M. Ellison: The nature of a useable PKI. Computer Networks 31(8): 823-830 (1999).
    • (1999) Computer Networks , vol.31 , Issue.8 , pp. 823-830
    • Ellison, C.M.1
  • 11
    • 0242332739 scopus 로고    scopus 로고
    • Small worlds in wireless networks
    • October
    • A. Helmy. Small worlds in wireless networks. IEEE communication letters, Vol.7, No 10, October 2003.
    • (2003) IEEE Communication Letters , vol.7 , Issue.10
    • Helmy, A.1
  • 12
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • December
    • M. Reiter and S. Stubblebine. Resilient authentication using path independence. IEEE Transactions on computers, Vol.47, No. 12, December 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.12
    • Reiter, M.1    Stubblebine, S.2
  • 13
    • 84944878224 scopus 로고    scopus 로고
    • Transitive signature schemes
    • S. Micali, R.L. Rivest: Transitive Signature Schemes, CT-RSA 2002: 236-243.
    • (2002) CT-RSA , pp. 236-243
    • Micali, S.1    Rivest, R.L.2
  • 15
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, R. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2): 281-308, 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 17
    • 17144421339 scopus 로고
    • Pretty Good Privacy (PGP)
    • MIT, October
    • Phil Zimmermann. Pretty Good Privacy (PGP), PGP User's Guide, MIT, October, 1994.
    • (1994) PGP User's Guide
    • Zimmermann, P.1
  • 18
    • 4644262856 scopus 로고    scopus 로고
    • New model on undirected transitive signatures
    • Huafei Zhu. New model on undirected transitive signatures. IEE Proceedings of Communication, 2004
    • (2004) IEE Proceedings of Communication
    • Zhu, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.