-
1
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures (extended abstract). In EUROCRYPT, pages 591-606, 1998.
-
(1998)
EUROCRYPT
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
3
-
-
84937441148
-
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
-
T. Okamoto, editor, ASIACRYPT, Springer
-
J. Camenisch and I. Damgård. Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. In T. Okamoto, editor, ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, pages 331-345. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
4
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT, pages 93-118, 2001.
-
(2001)
EUROCRYPT
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, volume 24, pages 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information Systems Security, 2(1):34-64, 1999.
-
(1999)
ACM Transactions on Information Systems Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
7
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory
-
L. C. Guillou and J-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both trasmission and memory. In EUROCRYPT, pages 123-128, 1988.
-
(1988)
EUROCRYPT
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
8
-
-
33646152637
-
-
Health card technologies, http://www.hct.com.
-
-
-
-
9
-
-
33646137255
-
-
Health insurance portability and accountability act. http://www.hipaa. org/.
-
-
-
-
11
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
12
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
84947917119
-
Publicly verifiable secret sharing
-
M. Stadler. Publicly verifiable secret sharing. In EUROCRYPT, pages 190-199, 1996.
-
(1996)
EUROCRYPT
, pp. 190-199
-
-
Stadler, M.1
|