메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 306-313

SELS: A secure E-mail List Service

Author keywords

Electronic mail; Mailing List; Security

Indexed keywords

ELECTRONIC MAIL; INFORMATION THEORY; JAVA PROGRAMMING LANGUAGE; NETWORK PROTOCOLS; SOFTWARE PROTOTYPING;

EID: 33644505148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1066677.1066752     Document Type: Conference Paper
Times cited : (27)

References (34)
  • 3
    • 0010689312 scopus 로고    scopus 로고
    • Carnegie Mellon Software Engineering Institute, Addison Wesley, Indianapolis. ISBN 0-2-1-73723-X
    • J. Allen, The CERT Guide to System and Network Security Practices, Carnegie Mellon Software Engineering Institute, Addison Wesley, Indianapolis, 2001. ISBN 0-2-1-73723-X.
    • (2001) The CERT Guide to System and Network Security Practices
    • Allen, J.1
  • 6
    • 3042683432 scopus 로고    scopus 로고
    • Message authentication using hash functions: The HMAC construction
    • RSA Laboratories', Spring
    • M. Bellare, R. Canetti, and H. Krawczyk, "Message authentication using hash functions: The HMAC construction", RSA Laboratories' CryptoBytes, Vol. 2, No. 1, Spring 1996.
    • (1996) CryptoBytes , vol.2 , Issue.1
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • LNCS 1403, Springer-Verlag
    • M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography", in Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998.
    • (1998) Eurocrypt'98
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing", SIAM Journal of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
    • (2003) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 14
    • 24944587762 scopus 로고    scopus 로고
    • Simple identity-based cryptography with mediated RSA
    • Cryptographer's Track
    • X. Ding and G. Tsudik, "Simple Identity-Based Cryptography with Mediated RSA", in Proceedings of the RSA Conference, Cryptographer's Track, 2003.
    • (2003) Proceedings of the RSA Conference
    • Ding, X.1    Tsudik, G.2
  • 15
    • 84943235829 scopus 로고
    • Pricing via processing or combatting junk mail
    • C. Dwork, M. Naor, "Pricing via Processing or Combatting Junk Mail", in Proceedings of CRYPTO'92, 1993, pp. 137-147.
    • (1993) Proceedings of CRYPTO'92 , pp. 137-147
    • Dwork, C.1    Naor, M.2
  • 18
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on the discrete logarithm
    • T. E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm", IEEE Transactions of Information Theory, pages 31(4): 469-472, 1985.
    • (1985) IEEE Transactions of Information Theory , vol.31 , Issue.4 , pp. 469-472
    • Gamal, T.E.1
  • 19
    • 33644553604 scopus 로고    scopus 로고
    • The GNU Privacy Guard, http://gnupg.org.
  • 23
    • 33644514442 scopus 로고
    • Privacy enhancement for internet electronic mail: Part I: Message encryption and authentication procedures
    • J. Linn, "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", IETF PEM WG RFC 21, 1993.
    • (1993) IETF PEM WG RFC , vol.21
    • Linn, J.1
  • 24
    • 33644509934 scopus 로고    scopus 로고
    • LISTSERV, http://www.lsoft.com.
    • LISTSERV
  • 27
    • 33644530501 scopus 로고    scopus 로고
    • Majordomo, http://www.greatcircle.com/majordomo.
    • Majordomo
  • 28
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • M. Mambo and E. Okamoto, "Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts", IEICE Transactions on Fundamentals, vol. E80-A, No. 1, 1997.
    • (1997) IEICE Transactions on Fundamentals , vol.E80-A , Issue.1
    • Mambo, M.1    Okamoto, E.2
  • 29
    • 0000961370 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting", in proceedings of ACM SIGCOMM 1997.
    • (1997) Proceedings of ACM SIGCOMM
    • Mittra, S.1
  • 31
    • 3042844664 scopus 로고    scopus 로고
    • Giving e-mail back to the users: Using digital signatures to solve the spam problem
    • September
    • T. Tompkins and D. Handley, "Giving e-mail back to the users: Using digital signatures to solve the spam problem", First Monday, 8(9), September 2003.
    • (2003) First Monday , vol.8 , Issue.9
    • Tompkins, T.1    Handley, D.2
  • 32
    • 33644503690 scopus 로고    scopus 로고
    • US Department of Energy Computer Incident Advisory, January 26 2000. http://ciac.llnl.gov/ciac/bulletins/k-020.shtml.
    • (2000)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.