메뉴 건너뛰기




Volumn 1, Issue 3, 2005, Pages 147-148

Two attacks on the Wu-Hsu user identification scheme

Author keywords

Anonymity; Distributed computer networks; Key distribution; User identification

Indexed keywords

ANONYMITY; COMMUNICATION COST; COMPUTATION COMPLEXITY; DISTRIBUTED COMPUTER NETWORKS; KEY DISTRIBUTION; SECURITY LEAK; USER IDENTIFICATION;

EID: 33645287503     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (8)

References (4)
  • 1
    • 0030192262 scopus 로고    scopus 로고
    • Parallel computation of the generating keys for RSA cryptosystems
    • C. C. Chang and M. S. Hwang, Parallel computation of the generating keys for RSA cryptosystems," IEE Electronics Letters, vol. 32, no. 15, pp. 1365-1366, 1996.
    • (1996) IEE Electronics Letters , vol.32 , Issue.15 , pp. 1365-1366
    • Chang, C.C.1    Hwang, M.S.2
  • 2
    • 0242410360 scopus 로고    scopus 로고
    • A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
    • M. S. Hwang, Eric J. L. Lu, and Iuon-Chang Lin, A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem," IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 6, pp. 1552-1560, 2003.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.6 , pp. 1552-1560
    • Hwang, M.S.1    Eric Lu, J.L.2    Lin, L.C.3
  • 3
    • 0034225062 scopus 로고    scopus 로고
    • User identification and key distribution maintaining anonymity for distributed computer networks
    • W. B. Lee and C. C. Chang, User identification and key distribution maintaining anonymity for distributed computer networks," Computer Systems Science and Engineering, vol. 15, no. 4, pp. 113-116, 2000.
    • (2000) Computer Systems Science and Engineering , vol.15 , Issue.4 , pp. 113-116
    • Lee, W.B.1    Chang, C.C.2
  • 4
    • 1542335490 scopus 로고    scopus 로고
    • Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    • T. S. Wu and C. L. Hsu, Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks," Computers & Security, vol. 23, no. 2, pp. 120-125, 2004.
    • (2004) Computers & Security , vol.23 , Issue.2 , pp. 120-125
    • Wu, T.S.1    Hsu, C.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.