메뉴 건너뛰기




Volumn 1, Issue , 2005, Pages 600-603

An efficient software-based security acceleration methods for open LBS services

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; CRYPTOGRAPHY; DATA PRIVACY; INFORMATION RETRIEVAL; INTERNET; MIDDLEWARE; PUBLIC POLICY; WIRELESS TELECOMMUNICATION SYSTEMS; XML;

EID: 33745685502     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IGARSS.2005.1526246     Document Type: Conference Paper
Times cited : (3)

References (24)
  • 1
    • 33745719928 scopus 로고    scopus 로고
    • Location Interoperability Forum (LIF), http://www.locationforum.org
  • 2
    • 3543061455 scopus 로고    scopus 로고
    • XML key management specification version 2.0
    • April
    • XML Key Management Specification Version 2.0 (W3C Working Draft), April 2003.
    • (2003) W3C Working Draft
  • 3
    • 3543057929 scopus 로고    scopus 로고
    • Delegated path validation and delegated path discovery protocol requirements
    • D. Pinkas and R. Housley, "Delegated Path Validation and Delegated Path Discovery Protocol Requirements", RFC 3379, 2002.
    • (2002) RFC , vol.3379
    • Pinkas, D.1    Housley, R.2
  • 5
    • 0035386879 scopus 로고    scopus 로고
    • Using XML security mechanisms
    • A Selkirk, "Using XML Security Mechanisms", BT Technol J 19 (3), 2001.
    • (2001) BT Technol J , vol.19 , Issue.3
    • Selkirk, A.1
  • 10
    • 24944523056 scopus 로고    scopus 로고
    • Toward the integration of web services security on enterprise environments
    • Yuichi Nakamur, et. Al., "Toward the Integration of web services security on enterprise environments", IEEE SAINT '02, 2002.
    • (2002) IEEE SAINT '02
    • Nakamur, Y.1
  • 11
    • 33745719971 scopus 로고    scopus 로고
    • April
    • OASIS, Web Service Security, http://www-106.ibm.com/, April 2002.
    • (2002) Web Service Security
  • 12
    • 33745690661 scopus 로고    scopus 로고
    • Location-based services
    • November
    • Harsha Srivatsa, "Location-based services", IBM Paper, November 2002.
    • (2002) IBM Paper
    • Srivatsa, H.1
  • 13
    • 26444538611 scopus 로고    scopus 로고
    • Towards simplifying PKI implementation : Client-server based validation of public key certificates
    • Diana Berbecaru, Antonio Lioy, "Towards Simplifying PKI Implementation : Client-Server based Validation of Public Key Certificates", IEEE ISSPIT 2002, pp.277-281.
    • (2002) IEEE ISSPIT , pp. 277-281
    • Berbecaru, D.1    Lioy, A.2
  • 14
    • 0242372132 scopus 로고    scopus 로고
    • Using OCSP to secure certificate-using transactions in M-commerce
    • Jose L. Munoz et. Al., "Using OCSP to Secure Certificate-Using transactions in M-Commerce", LNCS 2846, 2003,pp.280-292.
    • (2003) LNCS , vol.2846 , pp. 280-292
    • Munoz, J.L.1
  • 15
    • 0346885755 scopus 로고    scopus 로고
    • XML-based network management for IP networks
    • Mi-Jung Choi, et. Al., "XML-Based Network Management for IP Networks", ETRI Journal, Vol.25, No.6, 2005, pp. 445-463.
    • (2005) ETRI Journal , vol.25 , Issue.6 , pp. 445-463
    • Choi, M.-J.1
  • 16
    • 0242368158 scopus 로고    scopus 로고
    • A scalable structure for a multiplier and an inversion unit in GF(2m)
    • Chanho Lee, et. Al., "A Scalable Structure for a Multiplier and an Inversion Unit in GF(2m)", ETRI Journal, V.25, No.5, 2003, pp.315-320.
    • (2003) ETRI Journal , vol.25 , Issue.5 , pp. 315-320
    • Lee, C.1
  • 17
    • 21144456917 scopus 로고    scopus 로고
    • TY*secureWS:An integrated web service security solution based on Java
    • Sungmin Lee et. Al., "TY*SecureWS:An integrated Web Service Security Solution based on Java", LNCS 2738, 2003, pp.186-195.
    • (2003) LNCS , vol.2738 , pp. 186-195
    • Lee, S.1
  • 18
    • 2942654481 scopus 로고    scopus 로고
    • XML key information system for secure e-trading
    • Namje Park, Kiyoung Moon, Sungwon Sohn, "XML Key Information System for Secure e-Trading", WSEAS TRANSACTIONS on COMPUTERS, 2 (2), 2003, pp. 327-333.
    • (2003) WSEAS Transactions on Computers , vol.2 , Issue.2 , pp. 327-333
    • Park, N.1    Moon, K.2    Sohn, S.3
  • 21
    • 84958982846 scopus 로고    scopus 로고
    • Formal proofs for the security of signcryption
    • Joonsang Baek, et. Al., "Formal Proofs for the security of signcryption," PKC'02, pp.80-98.
    • PKC'02 , pp. 80-98
    • Baek, J.1
  • 22
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost(signature & encryption) ≪ cost(signature) + cost(encryption), advances in cryptology - Crypto'97
    • Springer-Verlag
    • Y. Zheng, "Digital signcryption or How to Achieve Cost(Signature & Encryption) ≪ Cost(Signature) + Cost(Encryption), Advances in Cryptology - Crypto'97", Lecture Notes in Computer Science, Vol. 1294. Springer-Verlag, 1997, pp.165-179.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 23
    • 13844281303 scopus 로고    scopus 로고
    • A gateway and framework for telematics systems independent on mobile networks
    • Wooyong Han, et. Al., "A Gateway and Framework for Telematics Systems Independent on Mobile Networks", ETRI Journal, Vol.27, No.1, 2005, pp.106-109.
    • (2005) ETRI Journal , vol.27 , Issue.1 , pp. 106-109
    • Han, W.1
  • 24
    • 6344231922 scopus 로고    scopus 로고
    • An efficient two-step paging strategy using base station paging agents in mobile communication networks
    • Jang Hyun Baek, et. Al., "An Efficient Two-Step Paging Strategy Using Base Station Paging Agents in Mobile Communication Networks", ETRI Journal, Vol.26, No.5, 2004, pp.493-496.
    • (2004) ETRI Journal , vol.26 , Issue.5 , pp. 493-496
    • Baek, J.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.