-
1
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Trans. Softw. Eng. 22(1) (1996), 6-15.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
33745522679
-
Separable identity-based ring signatures: Theoretical foundations for fighting phishing attacks
-
B. Adida, S. Hohenberger and R.L. Rivest, Separable identity-based ring signatures: Theoretical foundations for fighting phishing attacks, in: Proceedings of DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service, 2005.
-
(2005)
Proceedings of DIMACS Workshop on Theft in E-Commerce: Content, Identity, and Service
-
-
Adida, B.1
Hohenberger, S.2
Rivest, R.L.3
-
4
-
-
85039326968
-
-
AES. http://csrc.nist.gov/cryptotoolkit/aes/.
-
-
-
-
5
-
-
10444229615
-
Better privacy and security in e-commerce: Using elliptic curve-based zero-knowledge proofs
-
Washington, DC, USA, IEEE Computer Society
-
S. Almuhammadi, N.T. Sui and D. McLeod, Better privacy and security in e-commerce: Using elliptic curve-based zero-knowledge proofs, in: CEC'04: Proceedings of the IEEE International Conference on E-Commerce Technology (CEC'04), Washington, DC, USA, IEEE Computer Society, 2004, pp. 299-302.
-
(2004)
CEC'04: Proceedings of the IEEE International Conference on E-commerce Technology (CEC'04)
, pp. 299-302
-
-
Almuhammadi, S.1
Sui, N.T.2
McLeod, D.3
-
9
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in: Lecture Notes in Computer Science, Vol. 2139, 2001, pp. 213-240.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-240
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput. 32(3) (2003), 586-615.
-
(2003)
SIAM J. Comput.
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
11
-
-
0025568003
-
Value exchange systems enabling security and unobservability
-
H. Buerk and A. Pfitzmann, Value exchange systems enabling security and unobservability, Computer and Security 9(9) (1990), 715-721.
-
(1990)
Computer and Security
, vol.9
, Issue.9
, pp. 715-721
-
-
Buerk, H.1
Pfitzmann, A.2
-
12
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
New York, NY, USA, ACM Press
-
J. Camenisch and E. van Herreweghen, Design and implementation of the idemix anonymous credential system, in: CCS'02: Proceedings of the 9th ACM conference on Computer and Communications Security, New York, NY, USA, ACM Press, 2002, pp. 21-30.
-
(2002)
CCS'02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
13
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
London, UK, Springer
-
J. Camenisch and A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in: EUROCRYPT'OI: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, London, UK, Springer, 2001, pp. 93-118.
-
(2001)
EUROCRYPT'OI: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, Security without identification: transaction systems to make big brother obsolete, Commun. ACM 28(10) (1985), 1030-1044.
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
33745467659
-
A new on-line certificate validation method for improved security, scalability and interoperability
-
J.H. Choi, S.S. Lim and K. Zeilenga, A new on-line certificate validation method for improved security, scalability and interoperability, in: 6th IEEE Information Assurance Workshop, 2005.
-
(2005)
6th IEEE Information Assurance Workshop
-
-
Choi, J.H.1
Lim, S.S.2
Zeilenga, K.3
-
17
-
-
77953804362
-
The battle against phishing: Dynamic security skins
-
New York, NY, USA, ACM Press
-
R. Dhamija and J.D. Tygar, The battle against phishing: Dynamic security skins, in: SOUPS'05: Proceedings of the 2005 Symposium on Usable Privacy and Security, New York, NY, USA, ACM Press, 2005, pp. 77-88.
-
(2005)
SOUPS'05: Proceedings of the 2005 Symposium on Usable Privacy and Security
, pp. 77-88
-
-
Dhamija, R.1
Tygar, J.D.2
-
19
-
-
85039334345
-
-
IBM Zurich Research Laboratory, Privacy enhancing, Cryptography and Pseudonym Management. http://www.zurich.ibm.com/security/privacy/.
-
-
-
-
20
-
-
0023569922
-
Zero knowledge proofs of identity
-
New York, NY, USA, ACM Press
-
U. Fiege, A. Fiat and A. Shamir, Zero knowledge proofs of identity, in: STOC'87: Proceedings of the nineteenth annual ACM conference on Theory of computing, New York, NY, USA, ACM Press, 1987, pp. 210-217.
-
(1987)
STOC'87: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing
, pp. 210-217
-
-
Fiege, U.1
Fiat, A.2
Shamir, A.3
-
21
-
-
85008020099
-
Phishing attacks rising, but dollar losses down
-
G. Goth, Phishing attacks rising, but dollar losses down, IEEE Security and Privacy 3(1) (2005), 8.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.1
, pp. 8
-
-
Goth, G.1
-
24
-
-
85039334152
-
-
Identity-Management, Liberty alliance project, http://www.projectliberty. org.
-
-
-
-
25
-
-
85039323120
-
-
Internet2, Shibboleth, http://shibboleth.internet2.edu.
-
-
-
-
28
-
-
85039324880
-
-
Identity Theft Management, http://www.identitytheftmanagement.com/.
-
-
-
-
29
-
-
10444289681
-
Balanced binary trees for id management and load balance in distributed hash tables
-
New York, NY, USA, ACM Press
-
G.S. Manku, Balanced binary trees for id management and load balance in distributed hash tables, in: PODC'04: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, New York, NY, USA, ACM Press, 2004, pp. 197-205.
-
(2004)
PODC'04: Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing
, pp. 197-205
-
-
Manku, G.S.1
-
32
-
-
85015402934
-
Use of elliptic curves in cryptography
-
Springer-Verlag New York, Inc., New York, NY, USA
-
Victor S. Miller, Use of elliptic curves in cryptography, in: Lecture Notes in Computer Science; 218 on Advances in Cryptology - CRYPTO 85, Springer-Verlag New York, Inc., New York, NY, USA, 1986, pp. 417-426.
-
(1986)
Lecture Notes in Computer Science; 218 on Advances in Cryptology - CRYPTO 85
, pp. 417-426
-
-
Miller, V.S.1
-
33
-
-
0004115865
-
-
M. Myers, R. Ankney, A. Malpani, S. Galperin and C. Adams, X.509 Internet public key infrastructure online certificate status protocol - ocsp, 1999.
-
(1999)
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - Ocsp
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
34
-
-
85039321494
-
-
RSA Laboratories' Nightingale, http://www.rsasecurity.com/rsalabs/node. asp?id=2424.01
-
-
-
-
35
-
-
33745464413
-
Whitepaper on towards federated identity management
-
E. Norlin and A. Durand, Whitepaper on towards federated identity management, in: Ping Identity Corporation, 2002.
-
(2002)
Ping Identity Corporation
-
-
Norlin, E.1
Durand, A.2
-
38
-
-
85009805214
-
Fighting spam with reputation systems
-
V.V. Prakash and A. O'Donnell, Fighting spam with reputation systems, Queue 3(9) (2005), 36-41.
-
(2005)
Queue
, vol.3
, Issue.9
, pp. 36-41
-
-
Prakash, V.V.1
O'Donnell, A.2
-
40
-
-
85117362490
-
Single sign-on using cookies for web applications
-
Washington, DC, USA, IEEE Computer Society
-
V. Samar, Single sign-on using cookies for web applications, in: WETICE'99: Proceedings of the 8th Workshop o Enabling Technologies on Infrastructure for Collaborative Enterprises, Washington, DC, USA, IEEE Computer Society, 1999, pp. 158-163.
-
(1999)
WETICE'99: Proceedings of the 8th Workshop O Enabling Technologies on Infrastructure for Collaborative Enterprises
, pp. 158-163
-
-
Samar, V.1
-
41
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
New York, NY, USA, Springer, New York
-
C.P. Schnorr, Efficient identification and signatures for smart cards, in: CRYPTO'89: Proceedings on Advances in cryptology, New York, NY, USA, Springer, New York, 1989, pp. 239-252.
-
(1989)
CRYPTO'89: Proceedings on Advances in Cryptology
, pp. 239-252
-
-
Schnorr, C.P.1
-
42
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
New York, NY, USA, Springer, New York
-
A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of CRYPTO 84 on Advances in ciyptology, New York, NY, USA, Springer, New York, 1985, pp. 47-53.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Ciyptology
, pp. 47-53
-
-
Shamir, A.1
-
43
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
V. Shoup, Lower bounds for discrete logarithms and related problems, in: Lecture Notes in Computer Science, Vol. 1233, 1997, pp. 256-268.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 256-268
-
-
Shoup, V.1
-
45
-
-
3242880752
-
Digital certificates: A survey of revocation methods
-
New York, NY, USA, ACM Press
-
P. Wohlmacher, Digital certificates: a survey of revocation methods, in: MULTIMEDIA '00: Proceedings of the 2000 ACM workshops on Multimedia, New York, NY, USA, ACM Press, 2000, pp. 111-114.
-
(2000)
MULTIMEDIA '00: Proceedings of the 2000 ACM Workshops on Multimedia
, pp. 111-114
-
-
Wohlmacher, P.1
-
46
-
-
14844310246
-
Private inference control
-
New York, NY, USA, ACM Press
-
D. Woodruff and J. Staddon, Private inference control, in: CCS'04: Proceedings of the 11th ACM Conference on Computer and Communications Security, New York, NY, USA, ACM Press, 2004, pp. 188-197.
-
(2004)
CCS'04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 188-197
-
-
Woodruff, D.1
Staddon, J.2
|