메뉴 건너뛰기




Volumn 2692, Issue , 2003, Pages 332-347

Authenticated dictionaries for fresh attribute credentials

Author keywords

Authenticated dictionary; Authentication of cached data; Certificate revocation; Digital credential; Dynamic data structures; Third party data publication; Trust management

Indexed keywords

AUTHENTICATION;

EID: 21144440101     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44875-6_24     Document Type: Article
Times cited : (19)

References (19)
  • 1
    • 21044449695 scopus 로고    scopus 로고
    • Persistent authenticated dictionaries and their applications
    • Proc. Information Security Conference (ISC 2001), Springer-Verlag
    • A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Proc. Information Security Conference (ISC 2001), volume 2200 of LNCS, pages 379-393. Springer-Verlag, 2001.
    • (2001) LNCS , vol.2200 , pp. 379-393
    • Anagnostopoulos, A.1    Goodrich, M.T.2    Tamassia, R.3
  • 10
    • 84945279475 scopus 로고    scopus 로고
    • An efficient dynamic and distributed cryptographic accumulator
    • Proc. Int. Security Conference (ISC 2002), Springer-Verlag
    • M. T. Goodrich, R. Tamassia, and J. Hasic. An efficient dynamic and distributed cryptographic accumulator. In Proc. Int. Security Conference (ISC 2002), volume 2433 of LNCS, pages 372-388. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2433 , pp. 372-388
    • Goodrich, M.T.1    Tamassia, R.2    Hasic, J.3
  • 12
    • 35248831605 scopus 로고    scopus 로고
    • Authenticated data structures for graph and geometric searching
    • Proc. RSA Conference, Cryptographers Track (RSA-CT), Springer-Verlag
    • M. T. Goodrich, R. Tamassia, N. Triandopoulos, and R. Cohen. Authenticated data structures for graph and geometric searching. In Proc. RSA Conference, Cryptographers Track (RSA-CT), volume 2612 of LNCS, pages 295-313. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2612 , pp. 295-313
    • Goodrich, M.T.1    Tamassia, R.2    Triandopoulos, N.3    Cohen, R.4
  • 14
    • 84949191488 scopus 로고    scopus 로고
    • Nonmonotonicity, user interfaces, and risk assessment in certificate revocation
    • Proceedings of the 5th Internation Conference on Financial Cryptography (FC'01), Springer-Verlag
    • N. Li and J. Feigenbaum. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. In Proceedings of the 5th Internation Conference on Financial Cryptography (FC'01), volume 2339 of Lecture Notes in Computer Science, pages 166-177. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2339 , pp. 166-177
    • Li, N.1    Feigenbaum, J.2
  • 16
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Feb.
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 17
    • 84969346266 scopus 로고
    • A certified digital signature
    • G. Brassard, editor, Proc. CRYPTO '89, Springer-Verlag
    • R. C. Merkle. A certified digital signature. In G. Brassard, editor, Proc. CRYPTO '89, volume 435 of LNCS, pages 218-238. Springer-Verlag, 1990.
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.