-
2
-
-
34547356293
-
Research and practice for information security discipline construction and personnel training
-
Beijing: Higher Education Press
-
Zhang H G, Wang L N, Huang C H. Research and practice for information security discipline construction and personnel training. In: Symposium on Deans of Computer Institute of China. Beijing: Higher Education Press, 2005
-
(2005)
Symposium on Deans of Computer Institute of China
-
-
Zhang, H.G.1
Wang, L.N.2
Huang, C.H.3
-
6
-
-
34547241251
-
-
Schneier B. Applied Cryptography, Protocols, Algorithms and Source Code in C. New York: John Wiley & Sons, 1996
-
Schneier B. Applied Cryptography, Protocols, Algorithms and Source Code in C. New York: John Wiley & Sons, 1996
-
-
-
-
7
-
-
34547253541
-
-
Mao W. Modern Cryptography: Theory and Practice. HJ: Prentice Hall PTR, 2003
-
Mao W. Modern Cryptography: Theory and Practice. HJ: Prentice Hall PTR, 2003
-
-
-
-
8
-
-
62449237582
-
Research state and development trend of cryptology in and abroad
-
in Chinese
-
Feng D G. Research state and development trend of cryptology in and abroad. J Commun (in Chinese), 2002, 23(5): 18-26
-
(2002)
J Commun
, vol.23
, Issue.5
, pp. 18-26
-
-
Feng, D.G.1
-
9
-
-
84862918633
-
Development direction and latest progress for cryptology
-
in Chinese
-
Cao Z F, Shui XQ. Development direction and latest progress for cryptology. Comput Edu (in Chinese), 2005, 19-21
-
(2005)
Comput Edu
, pp. 19-21
-
-
Cao, Z.F.1
Shui, X.Q.2
-
10
-
-
19944425657
-
Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive
-
Report 2004/1999, Aug
-
Wang X Y, Feng D G, Lai X J, et al. Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive: Report 2004/1999, Aug. 2004
-
(2004)
-
-
Wang, X.Y.1
Feng, D.G.2
Lai, X.J.3
-
11
-
-
24944575304
-
Cryptanalysis of the Hash function MD4 and RIPEMD
-
Advance in Cryptology-Eurocrypt'05, Berlin: Springer-Verlag
-
Wang X Y, Lai X J, Feng D G, et al. Cryptanalysis of the Hash function MD4 and RIPEMD. In: Advance in Cryptology-Eurocrypt'05, LNCS 3494. Berlin: Springer-Verlag, 2005. 1-18
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.Y.1
Lai, X.J.2
Feng, D.G.3
-
12
-
-
24944591357
-
How to break MD5 and other Hash functions
-
Advance in Cryptology, Eurocrypt'05, Berlin: Springer-Verlag
-
Wang X Y, Yu H B. How to break MD5 and other Hash functions. In: Advance in Cryptology - Eurocrypt'05, LNCS 3494. Berlin: Springer-Verlag, 2005. 19-35
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.Y.1
Yu, H.B.2
-
13
-
-
33745122987
-
-
Wang X Y, Yu H B, Yin Y L. Efficient collision search attacks on SHA-0. In: Advance in Cryptology - Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 1-16
-
Wang X Y, Yu H B, Yin Y L. Efficient collision search attacks on SHA-0. In: Advance in Cryptology - Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 1-16
-
-
-
-
14
-
-
33745171465
-
-
Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In: Advance in Cryptology -Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 17-36
-
Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In: Advance in Cryptology -Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 17-36
-
-
-
-
15
-
-
34547314835
-
-
Federal Information Processing Standards Publication (FIPS 197) Advanced Encryption Standard AES, Nov. 26
-
Federal Information Processing Standards Publication (FIPS 197) Advanced Encryption Standard (AES), Nov. 26, 2001
-
(2001)
-
-
-
16
-
-
1542396925
-
Research on evolutionary cryptosystems and evolutionary DES
-
in Chinese
-
Zhang H G, Feng X T, Qin Z P, et al. Research on evolutionary cryptosystems and evolutionary DES. Chin J Comput (in Chinese), 2003, 26(12): 1678-1684
-
(2003)
Chin J Comput
, vol.26
, Issue.12
, pp. 1678-1684
-
-
Zhang, H.G.1
Feng, X.T.2
Qin, Z.P.3
-
17
-
-
12144263316
-
Design bent function using evolving method
-
Meng Q S, Zhang H G, Qin Z P, et al. Design bent function using evolving method. Acta Elect Sin (in Chinese), 2004, 32(11): 1901-1903
-
(2004)
Acta Elect Sin (in Chinese)
, vol.32
, Issue.11
, pp. 1901-1903
-
-
Meng, Q.S.1
Zhang, H.G.2
Qin, Z.P.3
-
18
-
-
33947580360
-
Evolutionary random number generator based on LFSR
-
Zhang H G, Wang Y H, Wang B J, et al. Evolutionary random number generator based on LFSR. Wuhan Univ J Natur Sci, 2007, 12(1): 179-182
-
(2007)
Wuhan Univ J Natur Sci
, vol.12
, Issue.1
, pp. 179-182
-
-
Zhang, H.G.1
Wang, Y.H.2
Wang, B.J.3
-
19
-
-
34547351890
-
-
Luo Q B, Zhang J Z, Zhou J. Complexity Analysis of the Chaotic Key Sequence, CHINACRYPT'2006 (in Chinese). Beijing: Press of Science and Technology of China, 2006
-
Luo Q B, Zhang J Z, Zhou J. Complexity Analysis of the Chaotic Key Sequence, CHINACRYPT'2006 (in Chinese). Beijing: Press of Science and Technology of China, 2006
-
-
-
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Comm ACM, 1978, 21: 120-126
-
(1978)
Comm ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
23
-
-
0018019325
-
Hiding information and signatures in trap dorr knapsacks
-
Merkle R C, Hellman M E. Hiding information and signatures in trap dorr knapsacks. IEEE Trans Inform Theory, 1978, 24(5): 525-530
-
(1978)
IEEE Trans Inform Theory
, vol.24
, Issue.5
, pp. 525-530
-
-
Merkle, R.C.1
Hellman, M.E.2
-
24
-
-
34547280630
-
-
Digitalized signatures and public key functions as intractable as factorization. Technical Report LCS/TR212, Cambridge MA , MIT
-
Rabin M O. Digitalized signatures and public key functions as intractable as factorization. Technical Report LCS/TR212, Cambridge MA (1979), MIT
-
(1979)
-
-
Rabin, M.O.1
-
25
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans Inform Theory, 1985, IT-31(4): 469-472
-
(1985)
IEEE Trans Inform Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
26
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N. Elliptic curve cryptosystem. Math Comput, 1978, 48: 203-209
-
(1978)
Math Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
27
-
-
34547306208
-
-
McEliece R J. A public key cryptosystem based on algebraic coding theory. DSN Progress Rep. 42-44, Jet Propulsion Lab, 1978, 114-116
-
McEliece R J. A public key cryptosystem based on algebraic coding theory. DSN Progress Rep. 42-44, Jet Propulsion Lab, 1978, 114-116
-
-
-
-
28
-
-
0037488744
-
A finite automaton public key cryptosystem and digital signatures
-
Tao R J, Chen S H. A finite automaton public key cryptosystem and digital signatures. Chin J Comput (in Chinese), 1985, 8(6): 401-409
-
(1985)
Chin J Comput (in Chinese)
, vol.8
, Issue.6
, pp. 401-409
-
-
Tao, R.J.1
Chen, S.H.2
-
29
-
-
0042689537
-
The multi-dimension RSA and its low exponent security
-
Cao Z F. The multi-dimension RSA and its low exponent security. Sci China Ser E-Tech Sci, 2000, 43(4): 349-354
-
(2000)
Sci China Ser E-Tech Sci
, vol.43
, Issue.4
, pp. 349-354
-
-
Cao, Z.F.1
-
30
-
-
0035416443
-
A threshold key escrow scheme based on public key cryptosystem
-
Cao Z F. A threshold key escrow scheme based on public key cryptosystem. Sci China Ser E-Tech Sci, 2001, 44(4): 441-448
-
(2001)
Sci China Ser E-Tech Sci
, vol.44
, Issue.4
, pp. 441-448
-
-
Cao, Z.F.1
-
31
-
-
14244261730
-
A public key cryptosystem based on a conic over finite fields Fp
-
in Chinese, Beijing: Science Press
-
Cao Z F. A public key cryptosystem based on a conic over finite fields Fp. In: Advances in Cryptology-Chinacrypt'98 (in Chinese). Beijing: Science Press, 1998. 45-49
-
(1998)
Advances in Cryptology-Chinacrypt'98
, pp. 45-49
-
-
Cao, Z.F.1
-
32
-
-
10444228993
-
Conic analog of RSA cryptosystem and some improved RSA cryptosystems
-
Cao Z F. Conic analog of RSA cryptosystem and some improved RSA cryptosystems. J Heilongjiang Univ (in Chinese), 1999, 16(4): 15-18
-
(1999)
J Heilongjiang Univ (in Chinese)
, vol.16
, Issue.4
, pp. 15-18
-
-
Cao, Z.F.1
-
33
-
-
34547297665
-
-
Cao Z F, Zhang Biao. MC public key cryptosystem based on Chinese remainder theorem. In: Advances in Cryptology-CHINACRYPT'2000 (in Chinese). Beijing: Science Press, 2000. 29-33
-
Cao Z F, Zhang Biao. MC public key cryptosystem based on Chinese remainder theorem. In: Advances in Cryptology-CHINACRYPT'2000 (in Chinese). Beijing: Science Press, 2000. 29-33
-
-
-
-
34
-
-
33744930359
-
Construct secure proxy cryptosystem
-
3822. Berlin: Springer-Verlag
-
Zhou Y, Cao Z F, Chai Z C. Construct secure proxy cryptosystem. CISC 2005, Lecture Notes in Computer Science, Vol. 3822. Berlin: Springer-Verlag, 2005. 150-161
-
(2005)
Lecture Notes in Computer Science
, vol.CISC 2005
, pp. 150-161
-
-
Zhou, Y.1
Cao, Z.F.2
Chai, Z.C.3
-
35
-
-
34547353166
-
-
in Chinese, Harbin: Helongjiang Education Press
-
Cao Z F. Public Key Cryptosystem (in Chinese). Harbin: Helongjiang Education Press, 1993
-
(1993)
Public Key Cryptosystem
-
-
Cao, Z.F.1
-
36
-
-
12344258539
-
Efficient identification and signature for smart cards
-
Schnorr C P. Efficient identification and signature for smart cards. J Cryptograp, 1991, 4(3): 161-174
-
(1991)
J Cryptograp
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
37
-
-
0003508562
-
-
NIST, DSS, Federal Information Processing Standards Publication
-
NIST. Digital Signature Standard (DSS), Federal Information Processing Standards Publication, 186
-
Digital Signature Standard
, pp. 186
-
-
-
38
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Trans Fundam, 1996, E79-A(9): 1338-1354
-
(1996)
IEICE Trans Fundam
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
39
-
-
33846118746
-
-
Shao J, Cao Z F, Lu R X. Improvement of Yang et al.'s threshold proxy signature scheme. J Systems Software, 2007, 80: 172-177
-
Shao J, Cao Z F, Lu R X. Improvement of Yang et al.'s threshold proxy signature scheme. J Systems Software, 2007, 80: 172-177
-
-
-
-
40
-
-
0020915882
-
Blind signatures for untraceable payments
-
New York: Plenum Press
-
Chaum D. Blind signatures for untraceable payments. In: Crypto'82. New York: Plenum Press, 1993. 199-203
-
(1993)
Crypto'82
, pp. 199-203
-
-
Chaum, D.1
-
41
-
-
33749458214
-
Provably secure robust threshold partial blind signature
-
Cao Z F, Zhu H J, Lu R X. Provably secure robust threshold partial blind signature. Sci China Ser F-Inf Sci, 2006, 49(5): 604-615
-
(2006)
Sci China Ser F-Inf Sci
, vol.49
, Issue.5
, pp. 604-615
-
-
Cao, Z.F.1
Zhu, H.J.2
Lu, R.X.3
-
42
-
-
34547378369
-
-
Liang X H, Cao Z F, Chai Z C, et al. ID-based threshold blind signature scheme from bilinear pair. In: ChinaCrypto'2006, 2006. 244-252
-
Liang X H, Cao Z F, Chai Z C, et al. ID-based threshold blind signature scheme from bilinear pair. In: ChinaCrypto'2006, 2006. 244-252
-
-
-
-
43
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Advances in Cryptography, Eurocrypt 2003, Berlin: Springer-Verlag
-
Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptography - Eurocrypt 2003, LNCS 2656. Berlin: Springer-Verlag, 2003. 416-432
-
(2003)
LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
-
44
-
-
0010252194
-
Undeniable signatures
-
CRYPTO'89, Berlin: Springer-Verlag
-
Chaum D, van Antwerpen H. Undeniable signatures. In: CRYPTO'89, LNCS 435. Berlin: Springer-Verlag, 1989. 212-216
-
(1989)
LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
van Antwerpen, H.2
-
45
-
-
10444252573
-
Threshold undeniable signature scheme based on coni
-
Lu R X, Cao Z F, Zhou Y. Threshold undeniable signature scheme based on coni. Appl Math Comput, 2005, 162(1): 165-177
-
(2005)
Appl Math Comput
, vol.162
, Issue.1
, pp. 165-177
-
-
Lu, R.X.1
Cao, Z.F.2
Zhou, Y.3
-
46
-
-
79958074367
-
A forward-secure digital signature scheme
-
CRYPTO'99, Berlin: Springer-Verlag
-
Bellare M, Miner S. A forward-secure digital signature scheme. In: CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999. 431-448
-
(1666)
LNCS
, pp. 431-448
-
-
Bellare, M.1
Miner, S.2
-
47
-
-
33750070723
-
-
Chai Z C, Cao Z F. Factoring-based proxy signature schemes with forward-security. In: Zhang J, et al. eds. CIS'2004, Lecture Notes in Computer Science, 3314. Berlin, Heidelberg: Springer-Verlag, 2004. 1034-1040
-
Chai Z C, Cao Z F. Factoring-based proxy signature schemes with forward-security. In: Zhang J, et al. eds. CIS'2004, Lecture Notes in Computer Science, Vol. 3314. Berlin, Heidelberg: Springer-Verlag, 2004. 1034-1040
-
-
-
-
48
-
-
35248813300
-
Strong key-insulated signature schemes
-
Public Key Cryptography, PKC 2003, Berlin: Springer-Verlag
-
Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes. In: Public Key Cryptography - PKC 2003, LNCS 2567. Berlin: Springer-Verlag, 2003. 130-144
-
(2003)
LNCS
, vol.2567
, pp. 130-144
-
-
Dodis, Y.1
Katz, J.2
Xu, S.3
-
49
-
-
84880883264
-
Improved online/offline signature schemes
-
Proceedings of Advances in Cryptology: Crypto'01, Berlin: Springer-Verlag
-
Shamir A, Tauman Y Improved online/offline signature schemes. In: Proceedings of Advances in Cryptology: Crypto'01, LNCS 2139. Berlin: Springer-Verlag, 2001. 355-367
-
(2001)
LNCS
, vol.2139
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
50
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Crypto'87, Berlin: Springer-Verlag
-
Desmedt Y. Society and group oriented cryptography: a new concept. In: Crypto'87, LNCS 293. Berlin: Springer-Verlag, 1988. 120-127
-
(1988)
LNCS
, vol.293
, pp. 120-127
-
-
Desmedt, Y.1
-
51
-
-
33845956283
-
Simulatability and security of certificateless threshold signatures
-
Wang L C, Cao Z F, Li X X et al. Simulatability and security of certificateless threshold signatures. Inform Sci, 2007, 177(6): 1382-1394
-
(2007)
Inform Sci
, vol.177
, Issue.6
, pp. 1382-1394
-
-
Wang, L.C.1
Cao, Z.F.2
Li, X.X.3
-
52
-
-
33646940989
-
A traceable threshold signature scheme with multiple signing policies
-
Shao J, Cao Z F. A traceable threshold signature scheme with multiple signing policies. Comput Secur, 2006, 25(3): 201-206
-
(2006)
Comput Secur
, vol.25
, Issue.3
, pp. 201-206
-
-
Shao, J.1
Cao, Z.F.2
-
53
-
-
84946833891
-
How to leak a secret
-
ASIACRYPT, Berlin: Springer-Verlag
-
Rivest R, Shamir A, Tauman Y. How to leak a secret. In: ASIACRYPT 2001, LNCS 2248. Berlin: Springer-Verlag, 2001. 552-565
-
(2001)
LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
54
-
-
34547374166
-
-
Lu R X, Cao Z F, Dong X L. Pairing-based proxy ring signature scheme with proxy signer privacy protection. In: China-Crypto'2006, 2006. 1-10
-
Lu R X, Cao Z F, Dong X L. Pairing-based proxy ring signature scheme with proxy signer privacy protection. In: China-Crypto'2006, 2006. 1-10
-
-
-
-
55
-
-
84927752554
-
Designated verifier proofs and their applications
-
EUROCRYPT'96, Berlin: Springer-Verlag
-
Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications. In: EUROCRYPT'96, LNCS 1070. Berlin: Springer-Verlag, 1996. 143-154
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
57
-
-
84948970342
-
Designated confirmer signatures
-
Eurocypt'94, Berlin: Springer-Verlag
-
Chaum D. Designated confirmer signatures. In: Eurocypt'94, LNCS 950. Berlin: Springer-Verlag, 1995. 86-91
-
(1995)
LNCS
, vol.950
, pp. 86-91
-
-
Chaum, D.1
-
59
-
-
34547292967
-
-
ITU-T, Rec. X.509 (revised) the Directory - Authentication Framework, 1993, International Telecommunication Union, Geneva, Switzerland
-
ITU-T, Rec. X.509 (revised) the Directory - Authentication Framework, 1993, International Telecommunication Union, Geneva, Switzerland
-
-
-
-
60
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptography, Crypto'84, Berlin: Springer-Verlag
-
Shamir A. Identity-based cryptosystems and signature schemes. In: Advances in Cryptography - Crypto'84, LNCS 196. Berlin: Springer-Verlag, 1984. 47-53
-
(1984)
LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
61
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh D, Franklin M. Identity-based encryption from the Weil pairing, SIAM. J Comput, 2003, 32(3): 586-615
-
(2003)
SIAM. J Comput
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
63
-
-
84885943723
-
Efficient ID-based one-time proxy signature and its application in E-cheque
-
5th International Conference on Cryptology and Network Security, CANS
-
Lu R X, Cao Z F, Dong X L. Efficient ID-based one-time proxy signature and its application in E-cheque. In: 5th International Conference on Cryptology and Network Security - CANS 2006, Lecture Notes in Computer Science, Vol. 4301. 2006, 153-167
-
(2006)
Lecture Notes in Computer Science
, vol.4301
, pp. 153-167
-
-
Lu, R.X.1
Cao, Z.F.2
Dong, X.L.3
-
64
-
-
33746324583
-
Efficient and provably secure multi-receiver identity-based signcryption. ACISP 2006
-
Duan S S, Cao Z F. Efficient and provably secure multi-receiver identity-based signcryption. ACISP 2006, Lecture Notes in Computer Science, Vol. 4058. 2006, 195-206
-
(2006)
Lecture Notes in Computer Science
, vol.4058
, pp. 195-206
-
-
Duan, S.S.1
Cao, Z.F.2
-
65
-
-
35048840186
-
Identity-based threshold decryption
-
Practice and Theory in Public Key Cryptography-PKC'2004, Singapore SG, March, Berlin: Springer-Verlag
-
Baek J, Zheng Y. Identity-based threshold decryption. In: Practice and Theory in Public Key Cryptography-PKC'2004, Singapore (SG), March 2004, LNCS 2947. Berlin: Springer-Verlag, 2004. 262-276
-
(2004)
LNCS
, vol.2947
, pp. 262-276
-
-
Baek, J.1
Zheng, Y.2
-
66
-
-
0345490607
-
-
Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In: Advances in Cryptology - Asiacrypt'2003, LNCS 2894. Berlin: Springer-Verlag, 2003. 452-473
-
Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In: Advances in Cryptology - Asiacrypt'2003, LNCS 2894. Berlin: Springer-Verlag, 2003. 452-473
-
-
-
-
69
-
-
0343337504
-
Non-malleable cryptography
-
Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM J Comput, 2000, 30(2): 391-437
-
(2000)
SIAM J Comput
, vol.30
, Issue.2
, pp. 391-437
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
70
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput, 1988, 17(2): 281-308
-
(1988)
SIAM J Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
71
-
-
84947237328
-
On the security of joint signature and encryption
-
Advances in Cryptology, EUROCRYPT'02, Berlin: Springer-Verlag
-
An J, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Advances in Cryptology - EUROCRYPT'02, LNCS 2332. Berlin: Springer-Verlag, 2002. 83-107
-
(2002)
LNCS
, vol.2332
, pp. 83-107
-
-
An, J.1
Dodis, Y.2
Rabin, T.3
-
73
-
-
0005078946
-
Entity authentication and key distribution
-
Advances in Cryptology, Crypto 1993, Berlin: Springer-Verlag
-
Bellare M, Rogaway P. Entity authentication and key distribution. In: Advances in Cryptology - Crypto 1993, LNCS 773. Berlin: Springer-Verlag, 1993, 110-125
-
(1993)
LNCS
, vol.773
, pp. 110-125
-
-
Bellare, M.1
Rogaway, P.2
-
74
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
New York: ACM Press
-
Bellare M, Rogaway P. Provably secure session key distribution: The three party case. In: 27th ACM Symposium on the Theory of Computing. New York: ACM Press, 1995. 57-66
-
(1995)
27th ACM Symposium on the Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
75
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Advances in Cryptology, Eurocrypt 2000, Berlin: Springer-Verlay
-
Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology - Eurocrypt 2000 LNCS 1807. Berlin: Springer-Verlay, 2000. 139-155
-
(2000)
LNCS
, vol.1807
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
76
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology-Eurocrypt 2001, Berlin: Springer-Verlag
-
Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology-Eurocrypt 2001 LNCS 2045. Berlin: Springer-Verlag, 2001. 453-474
-
(2001)
LNCS
, vol.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
77
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
Advances in Cryptology, Asiacrypt 2005, Berlin: Springer-Verlag
-
Choo K K R, Boyd C, Hitchcock Y Examining indistinguishability-based proof models for key establishment protocols. In: Advances in Cryptology - Asiacrypt 2005, LNCS 3788. Berlin: Springer-Verlag, 2005. 585-604
-
(2005)
LNCS
, vol.3788
, pp. 585-604
-
-
Choo, K.K.R.1
Boyd, C.2
Hitchcock, Y.3
-
79
-
-
33846817471
-
Simple three-party key exchange protocol
-
Lu R X, Cao Z F. Simple three-party key exchange protocol. Comput Secur, 2007, 26(1): 94-97
-
(2007)
Comput Secur
, vol.26
, Issue.1
, pp. 94-97
-
-
Lu, R.X.1
Cao, Z.F.2
-
80
-
-
24344478593
-
Efficient remote user authentication scheme using smart card
-
Lu R X, Cao Z F. Efficient remote user authentication scheme using smart card. Comput Networks, 2005, 49(4): 535-540
-
(2005)
Comput Networks
, vol.49
, Issue.4
, pp. 535-540
-
-
Lu, R.X.1
Cao, Z.F.2
-
81
-
-
33845638410
-
An improved deniable authentication protocol
-
Shao J, Cao Z F, Lu R X. An improved deniable authentication protocol. Networks, 2006, 48(4): 179-181
-
(2006)
Networks
, vol.48
, Issue.4
, pp. 179-181
-
-
Shao, J.1
Cao, Z.F.2
Lu, R.X.3
-
83
-
-
84990731886
-
How to prove yourself: {Practical} solutions to identification and signature problems
-
Berlin: Springer-Verlag
-
Fiat A, Shamir A. How to prove yourself: {Practical} solutions to identification and signature problems. In: Advances in Cryptology - Crypto'86. Berlin: Springer-Verlag, 1986. 186-194
-
(1986)
Advances in Cryptology - Crypto'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
85
-
-
84870707379
-
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
-
Advance in Cryptology-Crypto'98, Berlin: Springer-Verlag
-
Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Advance in Cryptology-Crypto'98, LNCS 1462. Berlin: Springer-Verlag, 1998. 13-25
-
(1998)
LNCS
, vol.1462
, pp. 13-25
-
-
Cramer, R.1
Shoup, V.2
-
86
-
-
35048835319
-
Efficient identity-based encryption without random oracle
-
Advances in Wyptology CRYPTO 2004, Berlin: Springer-verlag
-
Water B. Efficient identity-based encryption without random oracle. In: Advances in Wyptology CRYPTO 2004 LNCS 3152. Berlin: Springer-verlag, 2004. 443-459
-
(2004)
LNCS
, vol.3152
, pp. 443-459
-
-
Water, B.1
-
87
-
-
35048848152
-
Short signatures without random oracles
-
Advance in Cryptology- Eurocrypt'04
-
Boneh D, Boyen X. Short signatures without random oracles. In: Advance in Cryptology- Eurocrypt'04, LNCS 3027, 2004. 56-73
-
(2004)
LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
88
-
-
34547295398
-
Identity Authentication Without Lost of Quantum Channel
-
Beijing: Science Press
-
Zeng G H. Quantum Identity Authentication Without Lost of Quantum Channel. In: CHINACRYPT'2004. Beijing: Science Press, 2004
-
(2004)
CHINACRYPT
-
-
Zeng, G.1
Quantum, H.2
-
89
-
-
34547315374
-
DNA computing and DNA code
-
Xiao G Z, Lu M X. DNA computing and DNA code. J Engin Math, 2006, 23(1): 1-6
-
(2006)
J Engin Math
, vol.23
, Issue.1
, pp. 1-6
-
-
Xiao, G.Z.1
Lu, M.X.2
-
90
-
-
34547259065
-
-
Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA: DOD, December 1985
-
Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA: DOD, December 1985
-
-
-
-
91
-
-
34547306206
-
-
National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. USA: DOD, April 1991
-
National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. USA: DOD, April 1991
-
-
-
-
92
-
-
34547363433
-
-
National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. USA: DOD, July 1987
-
National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. USA: DOD, July 1987
-
-
-
-
93
-
-
34547311571
-
-
Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/
-
Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/
-
-
-
-
94
-
-
34547297661
-
-
The Open Trusted Computing (OpenTC) consortium. General activities of OpenTC [EB/OL]. [2006-3-1]. http://www.opentc.net/activities/
-
The Open Trusted Computing (OpenTC) consortium. General activities of OpenTC [EB/OL]. [2006-3-1]. http://www.opentc.net/activities/
-
-
-
-
95
-
-
34547296881
-
-
Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25]. http://www.microsoft.com/resources/ngscb/
-
Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25]. http://www.microsoft.com/resources/ngscb/
-
-
-
-
96
-
-
34547358537
-
-
Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2004-5-1]. http://www.intel.com/technology/security/
-
Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2004-5-1]. http://www.intel.com/technology/security/
-
-
-
-
97
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
Avizienis A, Laprie J -C, Randell B, et al. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Depend Secure Comput, 2004, 1(1): 11-33
-
(2004)
IEEE Trans Depend Secure Comput
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
-
98
-
-
34547319246
-
-
Zhang H G, Luo J, Jin G, et al. Development of trusted computing research. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2006, 52(5): 513-518
-
Zhang H G, Luo J, Jin G, et al. Development of trusted computing research. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2006, 52(5): 513-518
-
-
-
-
99
-
-
34547289402
-
-
Zhang H G, Wu G Q, Qin Z P, et al. Anew type of secure microcomputer. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 1-6
-
Zhang H G, Wu G Q, Qin Z P, et al. Anew type of secure microcomputer. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 1-6
-
-
-
-
100
-
-
34547285342
-
-
Zhan H G, Liu Y Z, Yu F J, et al. A new type of embedded secure module. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 7-11
-
Zhan H G, Liu Y Z, Yu F J, et al. A new type of embedded secure module. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 7-11
-
-
-
-
101
-
-
33846133227
-
An improved grid security infrastructure by trusted computing
-
Yan F, Zhang H G, Sun Q, et al. An improved grid security infrastructure by trusted computing. Wuhan Univ J Nat Sci, 2006, 11(6):1805-1808
-
(2006)
Wuhan Univ J Nat Sci
, vol.11
, Issue.6
, pp. 1805-1808
-
-
Yan, F.1
Zhang, H.G.2
Sun, Q.3
-
102
-
-
24944532285
-
A probabilistic trust model for handling inaccurate reputation sources
-
Paris, France, May 23-26
-
Patel J, Luke T W T, Jennings N R, et al. A probabilistic trust model for handling inaccurate reputation sources. In: Trust Management, Third International Conference, iTrust 2005. Paris, France, May 23-26, 2005. 193-209
-
(2005)
Trust Management, Third International Conference, iTrust
, pp. 193-209
-
-
Patel, J.1
Luke, T.W.T.2
Jennings, N.R.3
-
104
-
-
0242439292
-
Research of subjective trust management model based on the fuzzy set theory
-
Tang W, Chen Z. Research of subjective trust management model based on the fuzzy set theory. J Software (in Chinese), 2003, 14(8): 1401-1408
-
(2003)
J Software (in Chinese)
, vol.14
, Issue.8
, pp. 1401-1408
-
-
Tang, W.1
Chen, Z.2
-
106
-
-
34547353945
-
-
J Wuhan Univ Nat Sci Ed, in Chinese
-
Yuan L L, Zeng G S, Wang W. Trust evaluation model based on Dempster-Shafer evidence theory. J Wuhan Univ (Nat Sci Ed) (in Chinese), 2006, 52(5): 627-630
-
(2006)
Trust evaluation model based on Dempster-Shafer evidence theory
, vol.52
, Issue.5
, pp. 627-630
-
-
Yuan, L.L.1
Zeng, G.S.2
Wang, W.3
-
107
-
-
34250002868
-
-
in Chinese, Beijing: The Electronic Industry Press
-
Qu Y W. Software Behavior (in Chinese). Beijing: The Electronic Industry Press, 2004
-
(2004)
Software Behavior
-
-
Qu, Y.W.1
-
108
-
-
20444411497
-
Research on trustworthy network
-
Lin C, Peng X H. Research on trustworthy network. Chine J Comput (in Chinese), 2005, 28(5): 751-758
-
(2005)
Chine J Comput (in Chinese)
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.H.2
-
109
-
-
24744467831
-
The high trusted software engineer
-
Chen H W, Wang J, Dong W. The high trusted software engineer. Acta Elect Sin, 2003, 31(12): 1933-1938
-
(2003)
Acta Elect Sin
, vol.31
, Issue.12
, pp. 1933-1938
-
-
Chen, H.W.1
Wang, J.2
Dong, W.3
-
112
-
-
33750083297
-
Progress and Prospect on Information Security Research in China
-
Feng D G, Wang X Y. Progress and Prospect on Information Security Research in China. J Comput Sci Tech, 2006, 21(5): 740-755
-
(2006)
J Comput Sci Tech
, vol.21
, Issue.5
, pp. 740-755
-
-
Feng, D.G.1
Wang, X.Y.2
-
113
-
-
3042624656
-
Securing the high-speed internet
-
Shim S S Y, Gong L, Rubin A D, et al. Securing the high-speed internet. IEEE Comput, 2004, 37(6): 33-35
-
(2004)
IEEE Comput
, vol.37
, Issue.6
, pp. 33-35
-
-
Shim, S.S.Y.1
Gong, L.2
Rubin, A.D.3
-
114
-
-
0004200684
-
-
Electronic Systems Division, Air Force Systems Command, Bedford, MA, USA
-
Anderson J P. Computer security technology planning study. ESD-TR-73-51, Vol. II, Electronic Systems Division, Air Force Systems Command, Bedford, MA, USA
-
Computer security technology planning study. ESD-TR-73-51
, vol.2
-
-
Anderson, J.P.1
-
115
-
-
10744232231
-
Energy-efficient area monitoring for sensor networks
-
Carle J, Simplot-Ryl D. Energy-efficient area monitoring for sensor networks. IEEE Comput, 2004, 37(2): 40-46
-
(2004)
IEEE Comput
, vol.37
, Issue.2
, pp. 40-46
-
-
Carle, J.1
Simplot-Ryl, D.2
-
116
-
-
4344668572
-
WiseNET: An ultralow-power wireless sensor network solution
-
Enz C C, El-Hoiydi A, Decotignie J, et al. WiseNET: an ultralow-power wireless sensor network solution. IEEE Comput, 2004, 37(8): 62-70
-
(2004)
IEEE Comput
, vol.37
, Issue.8
, pp. 62-70
-
-
Enz, C.C.1
El-Hoiydi, A.2
Decotignie, J.3
-
119
-
-
34547361662
-
-
A guide to understanding covert channel analysis of trusted systems. National Computer Security Center. NCSC-TG-030
-
A guide to understanding covert channel analysis of trusted systems. National Computer Security Center. NCSC-TG-030
-
-
-
-
120
-
-
0032680807
-
Information hiding - A survey
-
Petitcolas F A P, Anderson R J, Kuhn M. G. Information hiding - A survey. Proc. IEEE, 1999, 87(7): 1062-1078
-
(1999)
Proc. IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.A.P.1
Anderson, R.J.2
Kuhn, M.G.3
-
122
-
-
0032095654
-
Multimedia data embedding and watermarking technologies
-
Swanson M D, Kobayashi M, Tewfik A. H. Multimedia data embedding and watermarking technologies. Proc. IEEE, 1998, 86(6): 1064-1087
-
(1998)
Proc. IEEE
, vol.86
, Issue.6
, pp. 1064-1087
-
-
Swanson, M.D.1
Kobayashi, M.2
Tewfik, A.H.3
-
123
-
-
84904224992
-
Steganalysis of images created using current steganography software
-
Proc. of 2nd International Workshop on Information Hiding
-
Johnson N F, Jajodia S. Steganalysis of images created using current steganography software. In: Proc. of 2nd International Workshop on Information Hiding. LNCS 1525, 1998. 273-289
-
(1998)
LNCS
, vol.1525
, pp. 273-289
-
-
Johnson, N.F.1
Jajodia, S.2
-
124
-
-
0030384775
-
Techniques for data hiding
-
Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding. IBM System J, 1996, 35(3/4): 313-337
-
(1996)
IBM System J
, vol.35
, Issue.3-4
, pp. 313-337
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
125
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I J, Killian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proc, 1997, 6(12): 1673-1687
-
(1997)
IEEE Trans Image Proc
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, F.T.3
-
126
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
Chen B, Wornell G W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inform Theory, 2001, 47(4): 1423-1443
-
(2001)
IEEE Trans Inform Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
|