메뉴 건너뛰기




Volumn 2, Issue 3, 2005, Pages 268-272

A framework for the revocation of unintended digital signatures initiated by malicious terminals

Author keywords

Authorization; Electronic commerce; Privacy; Security

Indexed keywords

COMPUTER CRIME; ELECTRONIC COMMERCE; HUMAN COMPUTER INTERACTION; INTERFACES (COMPUTER); SECURITY SYSTEMS; SMART CARDS;

EID: 27644530407     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2005.28     Document Type: Article
Times cited : (11)

References (18)
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses and digital pseudonyms
    • D. Chaum, "Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms," Comm. ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Comm. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 12
    • 27644526725 scopus 로고
    • Towards provably secure efficient electronic cash
    • Dept. of Computer Science, Columbia Univ.
    • M. Franklin and M. Yung, "Towards Provably Secure Efficient Electronic Cash," Technical Report CSUCS-018-92, Dept. of Computer Science, Columbia Univ., 1992.
    • (1992) Technical Report , vol.CSUCS-018-92
    • Franklin, M.1    Yung, M.2
  • 17
    • 27644440606 scopus 로고    scopus 로고
    • Protection of keys against modification attack
    • HKUST Theoretical Computer Science Center
    • W. Fung, M. Golin, and J. Gray, III, "Protection of Keys against Modification Attack," Research Report 2001-04, HKUST Theoretical Computer Science Center, 2001.
    • (2001) Research Report , vol.2001 , Issue.4
    • Fung, W.1    Golin, M.2    Gray III, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.