-
1
-
-
0038487086
-
"Secret Handshakes from Pairing-Based Key Agreements"
-
May
-
D. Balfanz, G. Durfee, N. Shankar, D. Smetters, J. Staddon, and H.-C. Wong, "Secret Handshakes from Pairing-Based Key Agreements," Proc. IEEE Symp. Security and Privacy, pp. 180-196, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 180-196
-
-
Balfanz, D.1
Durfee, G.2
Shankar, N.3
Smetters, D.4
Staddon, J.5
Wong, H.-C.6
-
3
-
-
0029700344
-
"Decentralized Trust Management"
-
May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. IEEE Symp. Security and Privacy, pp. 164-173, May 1996.
-
(1996)
Proc. IEEE Symp. Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
14844297757
-
"Concealing Complex Policies with Hidden Credentials"
-
Oct
-
R. Bradshaw, J. Holt, and K. Seamons, "Concealing Complex Policies with Hidden Credentials," Proc. 11th ACM Conf. Computer and Comm. Security, pp. 146-157, Oct. 2004.
-
(2004)
Proc. 11th ACM Conf. Computer and Comm. Security
, pp. 146-157
-
-
Bradshaw, R.1
Holt, J.2
Seamons, K.3
-
7
-
-
0000731055
-
"Security and Composition of Multiparty Cryptographic Protocols"
-
R. Canetti, "Security and Composition of Multiparty Cryptographic Protocols," J. Cryptology, vol. 13, no. 1, pp. 143-202, 2000.
-
(2000)
J. Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
8
-
-
0036038991
-
"Universally Composable Two-Party and Multi-Party Secure Computation"
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai, "Universally Composable Two-Party and Multi-Party Secure Computation," Proc. 24th ACM Symp. Theory of Computing, pp. 494-503, 2002.
-
(2002)
Proc. 24th ACM Symp. Theory of Computing
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
9
-
-
77950151506
-
"An Identity Based Encryption Scheme Based on Quadratic Residues"
-
Dec
-
C. Cocks, "An Identity Based Encryption Scheme Based on Quadratic Residues," Proc. Eighth IMA Int'l Conf. Cryptography and Coding, pp. 360-363. Dec. 2001.
-
(2001)
Proc. Eighth IMA Int'l Conf. Cryptography and Coding
, pp. 360-363
-
-
Cocks, C.1
-
12
-
-
0003593599
-
-
IETF RFC 2693, Sept
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, SPKI Certificate Theory. IETF RFC 2693, Sept. 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
13
-
-
0022080529
-
"A Randomized Protocol for Signing Contracts"
-
S. Even, O. Goldreich, and A. Lempel, "A Randomized Protocol for Signing Contracts," Comm. ACM, vol. 28, no. 6, pp. 637-647, 1985.
-
(1985)
Comm. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
35048820609
-
"Efficient Private Matching and Set Intersection"
-
May
-
M. Freedman, K. Nissim, B. Pinkas, "Efficient Private Matching and Set Intersection," Advances in Cryptology - Proc. EUROCRYPT 2004, pp. 1-19, May 2004.
-
(2004)
Advances in Cryptology - Proc. EUROCRYPT 2004
, pp. 1-19
-
-
Freedman, M.1
Nissim, K.2
Pinkas, B.3
-
15
-
-
0141610193
-
"Cryptography and Cryptographic Protocols"
-
O. Goldreich, "Cryptography and Cryptographic Protocols," Distributed Computing, vol. 16, nos. 2-3, pp. 177-199, 2003.
-
(2003)
Distributed Computing
, vol.16
, Issue.2-3
, pp. 177-199
-
-
Goldreich, O.1
-
17
-
-
0023545076
-
"How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority"
-
May
-
O. Goldreich, S. Micali, and A. Wigderson, "How to Play Any Mental Game or a Completeness Theorem for Protocols with Honest Majority," Proc. 19th ACM Symp. Theory of Computing, pp. 218-229, May 1986.
-
(1986)
Proc. 19th ACM Symp. Theory of Computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
1642394295
-
"Hidden Credentials"
-
Oct
-
J.E. Holt, R.W. Bradshaw, K.E. Seamons, and H. Orman, "Hidden Credentials," Proc. Second ACM Workshop Privacy in the Electronic Sec., pp. 1-8, Oct. 2003.
-
(2003)
Proc. Second ACM Workshop Privacy in the Electronic Sec.
, pp. 1-8
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Orman, H.4
-
20
-
-
1142293102
-
"Oblivious Signature-Based Envelope"
-
July
-
N. Li, W. Du, and D. Boneh, "Oblivious Signature-Based Envelope," Proc. 22nd ACM Symp. Principles of Distributed Computing, pp. 182-189, July 2003.
-
(2003)
Proc. 22nd ACM Symp. Principles of Distributed Computing
, pp. 182-189
-
-
Li, N.1
Du, W.2
Boneh, D.3
-
21
-
-
0036085965
-
"Design of a Role-Based Trust Management Framework"
-
May
-
N. Li, J.C. Mitchell, and W.H. Winsborough, "Design of a Role-Based Trust Management Framework," Proc. IEEE Symp. Security and Privacy, pp. 114-130, May 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
22
-
-
0037243196
-
"Distributed Credential Chain Discovery in Trust Management"
-
Feb
-
N. Li, W.H. Winsborough, and J.C. Mitchell, "Distributed Credential Chain Discovery in Trust Management," J. Computer Security, vol. 11, no. 1, pp. 35-86, Feb. 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
23
-
-
85084163840
-
"Fairplay - A Secure Two-Party Computation System"
-
Aug
-
D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella, "Fairplay - A Secure Two-Party Computation System," Proc. Usenix Security, pp. 287-302, Aug. 2004.
-
(2004)
Proc. Usenix Security
, pp. 287-302
-
-
Malkhi, D.1
Nisan, N.2
Pinkas, B.3
Sella, Y.4
-
26
-
-
84942550998
-
"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes"
-
P. Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," Advances in Cryptology - Proc. EUROCRYPT 1999, pp. 223-238, 1999.
-
(1999)
Advances in Cryptology - Proc. EUROCRYPT 1999
, pp. 223-238
-
-
Paillier, P.1
-
33
-
-
84939548725
-
"Automated Trust Negotiation"
-
Jan
-
W.H. Winsborough, K.E. Seamons, and V.E. Jones, "Automated Trust Negotiation," Proc. DARPA Information Survivability Conf. and Exposition, vol. I, pp. 88-102, Jan. 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
34
-
-
0036871183
-
"Negotiating Trust on the Web"
-
Nov
-
M. Winslett, T. Yu, K.E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating Trust on the Web," IEEE Internet Computing, vol. 6, no. 6, pp. 30-37, Nov. 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
37
-
-
0038148412
-
"A Unified Scheme for Resource Protection in Automated Trust Negotiation"
-
May
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, pp. 110-122, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
38
-
-
0035747337
-
"Interoperable Strategies in Automated Trust Negotiation"
-
Nov
-
T. Yu, M. Winslett, and K.E. Seamons, "Interoperable Strategies in Automated Trust Negotiation," Proc. Eighth ACM Conf. Computer and Comm. Security, pp. 146-155, Nov. 2001.
-
(2001)
Proc. Eighth ACM Conf. Computer and Comm. Security
, pp. 146-155
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|