메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 57-63

Message athentication by integrity with public corroboration

Author keywords

Data origin authentication; Digital signatures; Email source authentication; Message authentication; Phishing; Security by integrity; Spam; Undetected key compromise

Indexed keywords

CRYPTOGRAPHY; DATA ACQUISITION; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION ANALYSIS; PROBLEM SOLVING;

EID: 33745603791     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (34)
  • 3
    • 19744380329 scopus 로고    scopus 로고
    • Spamming, phishing, authentication and privacy
    • Inside Risks, Dec.
    • S. Bellovin, "Spamming, Phishing, Authentication and Privacy", Inside Risks, C.ACM 47(12), Dec.2004.
    • (2004) C.ACM , vol.47 , Issue.12
    • Bellovin, S.1
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing", SIAM Journal on Computing 32(3), 586-615, 2003.
    • (2003) SIAM Journal on Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 8
    • 0027684663 scopus 로고
    • Operating system protection through program evolution
    • 1 Oct.
    • F. Cohen, "Operating System Protection Through Program Evolution", Computers and Security 12(6), 1 Oct. 1993, pp. 565-584.
    • (1993) Computers and Security , vol.12 , Issue.6 , pp. 565-584
    • Cohen, F.1
  • 9
    • 0004046658 scopus 로고    scopus 로고
    • A taxonomy of obfuscating transformations
    • Dept. Computer Science, Univ. of Auckland (July)
    • C. Collberg, C. Thomborson, D. Low, "A Taxonomy of Obfuscating Transformations", Tech. Rep. 148, Dept. Computer Science, Univ. of Auckland (July 1997).
    • (1997) Tech. Rep. , vol.148
    • Collberg, C.1    Thomborson, C.2    Low, D.3
  • 10
    • 51749091237 scopus 로고    scopus 로고
    • Domain-based email authentication using public-keys advertised in the DNS (DomainKeys)
    • draft-delany-domainkeys-base-03.txt (29 Sept.)
    • M. Delany, "Domain-based Email Authentication Using Public-Keys Advertised in the DNS (DomainKeys)", Internet Draft (work in progress), draft-delany-domainkeys-base-03.txt (29 Sept. 2005). See also: http://en.wikipedia.org/wiki/Domain-keys.
    • (2005) Internet Draft (Work in Progress)
    • Delany, M.1
  • 11
    • 0028462933 scopus 로고
    • Threshold cryptography
    • July-August
    • Y. Desmedt, "Threshold Cryptography", Euro. Trans. Telecom. 5(4) 449-457, July-August 1994.
    • (1994) Euro. Trans. Telecom. , vol.5 , Issue.4 , pp. 449-457
    • Desmedt, Y.1
  • 14
    • 33745585254 scopus 로고    scopus 로고
    • Friederich Johann Buck: Arithmetic puzzles in cryptography
    • Oct.
    • J. von zur Gathen, "Friederich Johann Buck: Arithmetic Puzzles in Cryptography", Cryptologia, Oct. 2004.
    • (2004) Cryptologia
    • Von Zur Gathen, J.1
  • 17
    • 33745631135 scopus 로고    scopus 로고
    • Tolerating penetrations and insider attacks by requiring independent corroboration
    • C. Kahn, "Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration", 1998 New Security Paradigms Workshop (NSPW'98).
    • 1998 New Security Paradigms Workshop (NSPW'98).
    • Kahn, C.1
  • 21
    • 48349098931 scopus 로고    scopus 로고
    • Sender policy framework: Authorizing use of domains in MAIL FROM
    • draft-lentczner-spf-00 (Oct.)
    • M. Lentczner, M. Wong, "Sender Policy Framework: Authorizing Use of Domains in MAIL FROM", Internet Draft (work in progress), draft-lentczner-spf-00 (Oct. 2004). See also: http://en.wikipedia.org/wiki/ Sender-Policy-Framework.
    • (2004) Internet Draft (Work in Progress)
    • Lentczner, M.1    Wong, M.2
  • 23
    • 0017959977 scopus 로고
    • Secure communications over insecure channels
    • R. Merkle, "Secure Communications over Insecure Channels", C. ACM21 (1978), 294-299.
    • (1978) C. ACM , vol.21 , pp. 294-299
    • Merkle, R.1
  • 29
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Springer LNCS 1419
    • T. Sander, C.F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts", pp. 44-60, Mobile Agents and Security, Springer LNCS 1419 (1998).
    • (1998) Mobile Agents and Security , pp. 44-60
    • Sander, T.1    Tschudin, C.F.2
  • 30
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir, "Identity-based cryptosystems and signature schemes", Crypto'84 (LNCS 196), 47-53, 1985.
    • (1985) Crypto'84 (LNCS) , vol.196 , pp. 47-53
    • Shamir, A.1
  • 33
    • 33745584273 scopus 로고    scopus 로고
    • Trusted Computing Group, http://www.trustedcomputinggroup.org/home.
  • 34
    • 84892105785 scopus 로고    scopus 로고
    • Sender Policy Framework (SPF) for authorizing use of domains in E-MAIL, version 1
    • draft-schlitt-spf-classic-02 (June 6)
    • M. Wong, W. Schlitt, "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-MAIL, version 1", Internet Draft (work in progress), draft-schlitt-spf-classic-02 (June 6, 2005).
    • (2005) Internet Draft (Work in Progress)
    • Wong, M.1    Schlitt, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.