메뉴 건너뛰기




Volumn 4116 LNCS, Issue , 2006, Pages 288-302

Lightweight email signatures

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SCIENCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; WEBSITES;

EID: 33749991591     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11832072_20     Document Type: Conference Paper
Times cited : (11)

References (40)
  • 3
    • 84941155031 scopus 로고    scopus 로고
    • Anti-Phishing Working Group. http://www.antiphishing.org/.
  • 5
    • 35048876343 scopus 로고    scopus 로고
    • Security proofs for identity-based identification and signature schemes
    • M. Bellare, C. Namprempre, and G. Neven. Security proofs for identity-based identification and signature schemes. In EUROCRYPT, pp. 268-286, 1999.
    • (1999) EUROCRYPT , pp. 268-286
    • Bellare, M.1    Namprempre, C.2    Neven, G.3
  • 6
    • 19744380329 scopus 로고    scopus 로고
    • Spamming, phishing, authentication, and privacy
    • December
    • S. M. Bellovin. Spamming, phishing, authentication, and privacy. Inside Risks, Communications of the ACM, 47:12, December 2004.
    • (2004) Inside Risks, Communications of the ACM , vol.47 , pp. 12
    • Bellovin, S.M.1
  • 7
    • 20444490057 scopus 로고    scopus 로고
    • Off-the-record communication, or, why not to use PGP
    • ACM Press
    • N. Borisov, I. Goldberg, and E. Brewer. Off-the-record communication, or, why not to use PGP. In WPES '04, pp. 77-84. ACM Press, 2004.
    • (2004) WPES '04 , pp. 77-84
    • Borisov, N.1    Goldberg, I.2    Brewer, E.3
  • 8
    • 41849092597 scopus 로고    scopus 로고
    • Deniable authentication with rsa and multicasting
    • D. R. Brown. Deniable authentication with rsa and multicasting. In Cryptology ePrint Archive, Report 2005/056, 2005.
    • (2005) Cryptology ePrint Archive, Report , vol.2005 , Issue.56
    • Brown, D.R.1
  • 9
    • 85016672373 scopus 로고
    • Proofs of partial knowledge and simplified design of witness hiding protocols
    • R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO, pp. 174-187, 1994.
    • (1994) CRYPTO , pp. 174-187
    • Cramer, R.1    Damgård, I.2    Schoenmakers, B.3
  • 11
    • 25144519584 scopus 로고    scopus 로고
    • Phish. and hips: Human interactive proofs to detect phishing attacks
    • HIP
    • R. Dhamija and J. D. Tygar. Phish. and hips: Human interactive proofs to detect phishing attacks. In HIP, vol. 3517 of LNCS, pp. 127-141, 2005.
    • (2005) LNCS , vol.3517 , pp. 127-141
    • Dhamija, R.1    Tygar, J.D.2
  • 12
    • 84941147384 scopus 로고    scopus 로고
    • Spam attacks: P2P to the rescue
    • E. D. et. al. Spam Attacks: P2P to the Rescue. In WWW '04, pp. 358-359, 2004.
    • (2004) WWW '04 , pp. 358-359
    • D., E.1
  • 13
    • 84941165675 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure (latest draft)
    • Jan.
    • M. C. et. al. Internet X.509 Public Key Infrastructure (latest draft). IETF Internet Drafts, Jan. 2005.
    • (2005) IETF Internet Drafts
    • C., M.1
  • 14
    • 3042823619 scopus 로고    scopus 로고
    • Email-based identification and authentication: An alternative to PKI?
    • Nov.
    • S. L. Garfinkel. Email-Based Identification and Authentication: An Alternative to PKI? IEEE Security & Privacy, 1(6):20-26, Nov. 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 20-26
    • Garfinkel, S.L.1
  • 15
    • 84947558992 scopus 로고
    • A "paradoxical" identity-based signature scheme resulting from zero-knowledge
    • L. C. Guillou and J.-J. Quisquater. A "paradoxical" identity-based signature scheme resulting from zero-knowledge. In CRYPTO, vol. 403, pp. 216-231, 1988.
    • (1988) CRYPTO , vol.403 , pp. 216-231
    • Guillou, L.C.1    Quisquater, J.-J.2
  • 16
    • 23944479821 scopus 로고    scopus 로고
    • Controlling spam by secure internet content selection
    • vol. 3352 of LNCS
    • A. Herzberg. Controlling spam by secure internet content selection. In 4th Security in Communication Networks (SCN), vol. 3352 of LNCS, pp. 337-350, 2004.
    • (2004) 4th Security in Communication Networks (SCN) , pp. 337-350
    • Herzberg, A.1
  • 17
    • 84941160073 scopus 로고    scopus 로고
    • SMTP service exten. for secure SMTP over transport layer security
    • P. Huffman. SMTP Service Exten. for Secure SMTP over Transport Layer Security. Internet Mail Consortium RFC. http://www.faqs.org/rfcs/rfc3207.html.
    • Internet Mail Consortium RFC
    • Huffman, P.1
  • 18
    • 84941159672 scopus 로고    scopus 로고
    • IETF. The DKIM Working Group, http://mipassoc.org/dkim/.
  • 20
    • 26444453924 scopus 로고    scopus 로고
    • Modeling and preventing phishing attacks
    • A. Patrick and M. Yung, editors, LNCS
    • M. Jakobsson. Modeling and Preventing Phishing Attacks. In A. Patrick and M. Yung, editors, Financial Cryptography '05, LNCS, 2005.
    • (2005) Financial Cryptography '05
    • Jakobsson, M.1
  • 21
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • EUROCRYPT '96
    • M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In EUROCRYPT '96, vol. 1233 of LNCS, 1996.
    • (1996) LNCS , vol.1233
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 26
    • 51249094052 scopus 로고    scopus 로고
    • Filtering spam with SpamAssassin
    • J. Mason. Filtering Spam with SpamAssassin. In HEANet Conference, 2002.
    • (2002) HEANet Conference
    • Mason, J.1
  • 28
    • 13944276290 scopus 로고    scopus 로고
    • SpamBayes: Effective open-source, Bayesian based, email classification system
    • July
    • T. Meyer and B. Whateley. SpamBayes: Effective open-source, Bayesian based, email classification system. In Conference on Email and Anti-Spam, July 2004.
    • (2004) Conference on Email and Anti-spam
    • Meyer, T.1    Whateley, B.2
  • 30
    • 84857630832 scopus 로고    scopus 로고
    • Microsoft. The Sender ID Framework, http://www.microsoft.com/mscorp/ safety/technologies/senderid/default.mspx.
    • The Sender ID Framework
  • 32
    • 84941157007 scopus 로고    scopus 로고
    • Z. News. http://news.zdnet.com/2100-9595_22-519795.html?legacy=zdnn.
    • News, Z.1
  • 33
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • ASIACRYPT '01
    • R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In ASIACRYPT '01, vol. 2248 of LNCS, pp. 552-565, 2001.
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.L.1    Shamir, A.2    Tauman, Y.3
  • 36
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • CRYPTO '84
    • A. Shamir. Identity-based cryptosystems and signature schemes. In CRYPTO '84, vol. 196 of LNCS, pp. 47-53, 1985.
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 37
    • 84910623624 scopus 로고    scopus 로고
    • Domain-based administration of identity-based cryptosystems for secure email and IPSEC
    • D. Smetters and G. Durfee. Domain-based administration of identity-based cryptosystems for secure email and IPSEC. In USENIX Security Symposium, 2003.
    • (2003) USENIX Security Symposium
    • Smetters, D.1    Durfee, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.