-
1
-
-
0031354167
-
Server-supported signatures
-
Asokan, N., Tsudik, G. and Waidner, M., Server-supported signatures, Journal of Computer Security 5, 1, 91-108, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.1
, pp. 91-108
-
-
Asokan, N.1
Tsudik, G.2
Waidner, M.3
-
2
-
-
0038337735
-
Digital signature scheme resulted from identification protocol by elliptic curve cryptosystem
-
Chen, T.-S., Huang , G.-S., Liu, T.-P., and Chung, Y.-F., Digital signature scheme resulted from identification protocol by elliptic curve cryptosystem, In Proceedings of the 2002 IEEE TENCON'02, Vol. 1, pp. 192-195, 2002.
-
(2002)
Proceedings of the 2002 IEEE TENCON'02
, vol.1
, pp. 192-195
-
-
Chen, T.-S.1
Huang, G.-S.2
Liu, T.-P.3
Chung, Y.-F.4
-
4
-
-
0017018484
-
New directions in cryptography
-
Diffie, W. and Hellman, M. E., New directions in cryptography, IEEE Transactions on Information Theory, IT-22(6): 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
5
-
-
84870298493
-
Experimenting with server-aided signatures
-
Ding, X., Mazzocchi, D. and Tsudik, G., Experimenting with server-aided signatures, In Proceedings of the Network and Distributed Systems Security Symposium, 2002.
-
(2002)
Proceedings of the Network and Distributed Systems Security Symposium
-
-
Ding, X.1
Mazzocchi, D.2
Tsudik, G.3
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
July
-
ElGamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, Vol. IT-31, pp. 469-472, July, 1985.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
2442449839
-
An asymmetric authentication protocol for M-Commerce applications
-
He, L. and Zhang, N., An asymmetric authentication protocol for M-Commerce applications, In Proceedings of the eighth IEEE ISCC'2003, Vol. 1, pp. 244-250, 2003.
-
(2003)
Proceedings of the Eighth IEEE ISCC'2003
, vol.1
, pp. 244-250
-
-
He, L.1
Zhang, N.2
-
8
-
-
0010567510
-
Proxy signatures
-
revisited, In Proceedings of ICICS97, Springer Verlag
-
Kim, S., Park, S. and Won, D., Proxy signatures, revisited, In Proceedings of ICICS97, LNCS 1334, Springer Verlag, pp. 223-232, 1997.
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
9
-
-
84958968002
-
Secure transactions with mobile agents in hostile environments
-
Springer Verlag
-
Kotzanikolaou, P., Burmester, M. and Chrissikopoulos, V., Secure transactions with mobile agents in hostile environments, LNCS 1841, Springer Verlag, pp. 289-297, 2000.
-
(2000)
LNCS
, vol.1841
, pp. 289-297
-
-
Kotzanikolaou, P.1
Burmester, M.2
Chrissikopoulos, V.3
-
10
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages, IEICE transactions on fundamentals of electronics
-
Mambo, M., Usuda, K. and Okamoto, E., Proxy signatures: delegation of the power to sign messages, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 9, pp. 1338-1354, 1996.
-
(1996)
Communications and Computer Sciences
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
11
-
-
85028812333
-
On verifiable implicit asking protocols for RSA computation
-
Proceedings of Auscrypt'92, Springer Verlag
-
Matsumoto, T., Imai, H., Laih, C. S. and Yen, S. M., On verifiable implicit asking protocols for RSA computation, In Proceedings of Auscrypt'92, LNCS 718, Springer Verlag, pp. 296-307, 1993.
-
(1993)
LNCS
, vol.718
, pp. 296-307
-
-
Matsumoto, T.1
Imai, H.2
Laih, C.S.3
Yen, S.M.4
-
12
-
-
85031767993
-
Speeding up computation with insecrue auxiliary devices
-
Proceedings of Crypto'88, Springer Verlag
-
Matsumoto, T., Kato, K. and Imai, H., Speeding up computation with insecrue auxiliary devices, In Proceedings of Crypto'88, LNCS 403, Springer Verlag, pp. 497-506, 1989.
-
(1989)
LNCS
, vol.403
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
15
-
-
0003851399
-
-
John Wiley & Sons, Inc
-
Schneier, B., Applied cryptography: protocols, algorithms, and source code in C, John Wiley & Sons, Inc, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
16
-
-
0033354258
-
Threshold proxy signatures
-
Sun, H.-M., Lee, N.-Y. and Hwang, T., Threshold proxy signatures, In IEE Proceedings -Computers and Digital Techniques, Vol. 146, No. 5, pp. 259-263, 1999.
-
(1999)
IEE Proceedings -computers and Digital Techniques
, vol.146
, Issue.5
, pp. 259-263
-
-
Sun, H.-M.1
Lee, N.-Y.2
Hwang, T.3
-
17
-
-
2442445658
-
-
3G security; security architecture
-
Technical Specification 3GPP, 3G security; security architecture, http//www.3gpp.org, 2000.
-
(2000)
Technical Specification 3GPP
-
-
|