-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Aid and P.D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer System, 1(3), pp.239-248, 1983.
-
(1983)
ACM Transactions on Computer System
, vol.1
, Issue.3
, pp. 239-248
-
-
Aid, S.G.1
Taylor, P.D.2
-
2
-
-
0033279983
-
-
D. Boneh, M. Franklin. Anonymous authentication with subset queries. In Proceedings of The 6th ACM Conference on Computer and Communications Security, ACM Press, 1999.
-
D. Boneh, M. Franklin. Anonymous authentication with subset queries. In Proceedings of The 6th ACM Conference on Computer and Communications Security, ACM Press, 1999.
-
-
-
-
3
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
C.C. Chang, R.J. Hwaug, and T.C. Wu. Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 17(3), pp.243-247, 1992.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwaug, R.J.2
Wu, T.C.3
-
4
-
-
0022145479
-
Security without identification: Transaction systems to rnako big brother obsolete
-
D. Chaum. Security without identification: transaction systems to rnako big brother obsolete. Communications of the ACM 28(10), pp.1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
5
-
-
79251590715
-
-
D. Chaum, J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between orgainzation. In Proceedings of Advances in Cryptology - Crypto 86, Lecture Notes in Computer Science 263, pp.118-167, 1986.
-
D. Chaum, J.-H. Evertse. A secure and privacy-protecting protocol for transmitting personal information between orgainzation. In Proceedings of Advances in Cryptology - Crypto 86, Lecture Notes in Computer Science 263, pp.118-167, 1986.
-
-
-
-
6
-
-
0030107190
-
-
D.E. Denning, D.K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM 39 (3), pp.34:-40, 1.996.
-
D.E. Denning, D.K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM 39 (3), pp.34:-40, 1.996.
-
-
-
-
7
-
-
0024984004
-
-
U. Feige, A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of The 22nd A CM Symposium on Theory of Computing, pp.416-4.26, ACM Press, 1990.
-
U. Feige, A. Shamir. Witness indistinguishable and witness hiding protocols. In Proceedings of The 22nd A CM Symposium on Theory of Computing, pp.416-4.26, ACM Press, 1990.
-
-
-
-
9
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L. Harn and H. Y. Lin. A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), pp.539-546, 1990.
-
(1990)
Computers & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
10
-
-
34247373327
-
-
ISO/IEC 9798-1. Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model. ISO, Geneva, Switzerland, 1991 (first edition).
-
ISO/IEC 9798-1. Information technology - Security techniques - Entity authentication mechanisms - Part 1: General model. ISO, Geneva, Switzerland, 1991 (first edition).
-
-
-
-
11
-
-
34247357652
-
-
ISO/IEC 9798-2. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms. ISO, Geneva, Switzerland, 1994 (first edition).
-
ISO/IEC 9798-2. Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms. ISO, Geneva, Switzerland, 1994 (first edition).
-
-
-
-
12
-
-
34247395669
-
-
ISO/IEC 9798-3. Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a publio-koy algorithm. ISO, Geneva, Switzerland, 1993 (first edition).
-
ISO/IEC 9798-3. Information technology - Security techniques - Entity authentication mechanisms - Part 3: Entity authentication using a publio-koy algorithm. ISO, Geneva, Switzerland, 1993 (first edition).
-
-
-
-
13
-
-
34247325854
-
-
ISO/IEC 9798-4. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function. ISO, Gonova, Switzerland, 1995 (first edition).
-
ISO/IEC 9798-4. Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function. ISO, Gonova, Switzerland, 1995 (first edition).
-
-
-
-
14
-
-
34247378495
-
-
ISO/IEC 9798-5. Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero knowledge techniques. ISO, Geneva, Switzerland, 1996 (draft).
-
ISO/IEC 9798-5. Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero knowledge techniques. ISO, Geneva, Switzerland, 1996 (draft).
-
-
-
-
15
-
-
84957649548
-
-
J. Kilian, E. Petrank. Identity escrow. In Proceedings of Advances in Cryptology - Crypto 98, Lecture Notes in Computer Science 1.462, pp.169-185, Springer-Verlag, 1998.
-
J. Kilian, E. Petrank. Identity escrow. In Proceedings of Advances in Cryptology - Crypto 98, Lecture Notes in Computer Science 1.462, pp.169-185, Springer-Verlag, 1998.
-
-
-
-
16
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S.J. Mackinnon, P.D. Taylor, H. Meijer, and S.G. Akl. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), pp.797-802, 1985.
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
17
-
-
34247332903
-
-
A. Lysyanskaya, R. Rivost, A. Sahai, S. Wolf. Pseudonym systems. The 6th Annual Workshop on Selected Areas in Cryptography, Lecture Notes in Computer Science 1758, Springer-Verlag, 1999.
-
A. Lysyanskaya, R. Rivost, A. Sahai, S. Wolf. Pseudonym systems. The 6th Annual Workshop on Selected Areas in Cryptography, Lecture Notes in Computer Science 1758, Springer-Verlag, 1999.
-
-
-
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystoins
-
R. Rivest, A. Shamir, L. Adleman. A method for obtaining digital signatures and public-key cryptosystoins. Communications of the ACM 21(2), pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
21
-
-
0344718652
-
Common modulus and chosen message attacks on public-key schemes with linear recurrence relations
-
W.-G. Tzeug. Common modulus and chosen message attacks on public-key schemes with linear recurrence relations. Information Processing Letters 70, pp.153-156, 1999.
-
(1999)
Information Processing Letters
, vol.70
, pp. 153-156
-
-
Tzeug, W.-G.1
-
22
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W.-G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 14(1), pp.182-188, 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
23
-
-
0033605501
-
Inter-protocol interleaving attacks on some authentication and key distribution protocols
-
W.-G. Tzeug, C.-M. Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Information Processing Letters 69(6), pp.297-302, 1999.
-
(1999)
Information Processing Letters
, vol.69
, Issue.6
, pp. 297-302
-
-
Tzeug, W.-G.1
Hu, C.-M.2
|