메뉴 건너뛰기




Volumn 50, Issue 3, 2007, Pages 273-298

Survey of information security

Author keywords

Cryptology; Information hiding; Information security; Network security; Trusted computing

Indexed keywords


EID: 34547277604     PISSN: 10092757     EISSN: 18622836     Source Type: Journal    
DOI: 10.1007/s11432-007-0037-2     Document Type: Article
Times cited : (82)

References (126)
  • 2
    • 34547356293 scopus 로고    scopus 로고
    • Research and practice for information security discipline construction and personnel training
    • Beijing: Higher Education Press
    • Zhang H G, Wang L N, Huang C H. Research and practice for information security discipline construction and personnel training. In: Symposium on Deans of Computer Institute of China. Beijing: Higher Education Press, 2005
    • (2005) Symposium on Deans of Computer Institute of China
    • Zhang, H.G.1    Wang, L.N.2    Huang, C.H.3
  • 6
    • 34547241251 scopus 로고    scopus 로고
    • Schneier B. Applied Cryptography, Protocols, Algorithms and Source Code in C. New York: John Wiley & Sons, 1996
    • Schneier B. Applied Cryptography, Protocols, Algorithms and Source Code in C. New York: John Wiley & Sons, 1996
  • 7
    • 34547253541 scopus 로고    scopus 로고
    • Mao W. Modern Cryptography: Theory and Practice. HJ: Prentice Hall PTR, 2003
    • Mao W. Modern Cryptography: Theory and Practice. HJ: Prentice Hall PTR, 2003
  • 8
    • 62449237582 scopus 로고    scopus 로고
    • Research state and development trend of cryptology in and abroad
    • in Chinese
    • Feng D G. Research state and development trend of cryptology in and abroad. J Commun (in Chinese), 2002, 23(5): 18-26
    • (2002) J Commun , vol.23 , Issue.5 , pp. 18-26
    • Feng, D.G.1
  • 9
    • 84862918633 scopus 로고    scopus 로고
    • Development direction and latest progress for cryptology
    • in Chinese
    • Cao Z F, Shui XQ. Development direction and latest progress for cryptology. Comput Edu (in Chinese), 2005, 19-21
    • (2005) Comput Edu , pp. 19-21
    • Cao, Z.F.1    Shui, X.Q.2
  • 10
    • 19944425657 scopus 로고    scopus 로고
    • Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive
    • Report 2004/1999, Aug
    • Wang X Y, Feng D G, Lai X J, et al. Collisions for Hash functions MD4, MD5, HAVAL-128 and RIPEMD, Cryptology ePrint Archive: Report 2004/1999, Aug. 2004
    • (2004)
    • Wang, X.Y.1    Feng, D.G.2    Lai, X.J.3
  • 11
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the Hash function MD4 and RIPEMD
    • Advance in Cryptology-Eurocrypt'05, Berlin: Springer-Verlag
    • Wang X Y, Lai X J, Feng D G, et al. Cryptanalysis of the Hash function MD4 and RIPEMD. In: Advance in Cryptology-Eurocrypt'05, LNCS 3494. Berlin: Springer-Verlag, 2005. 1-18
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.Y.1    Lai, X.J.2    Feng, D.G.3
  • 12
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other Hash functions
    • Advance in Cryptology, Eurocrypt'05, Berlin: Springer-Verlag
    • Wang X Y, Yu H B. How to break MD5 and other Hash functions. In: Advance in Cryptology - Eurocrypt'05, LNCS 3494. Berlin: Springer-Verlag, 2005. 19-35
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.Y.1    Yu, H.B.2
  • 13
    • 33745122987 scopus 로고    scopus 로고
    • Wang X Y, Yu H B, Yin Y L. Efficient collision search attacks on SHA-0. In: Advance in Cryptology - Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 1-16
    • Wang X Y, Yu H B, Yin Y L. Efficient collision search attacks on SHA-0. In: Advance in Cryptology - Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 1-16
  • 14
    • 33745171465 scopus 로고    scopus 로고
    • Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In: Advance in Cryptology -Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 17-36
    • Wang X Y, Yin Y L, Yu H B. Finding collisions in the full SHA-1. In: Advance in Cryptology -Crypto 05, LNCS 3621. Berlin: Springer-Verlag, 2005. 17-36
  • 15
    • 34547314835 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication (FIPS 197) Advanced Encryption Standard AES, Nov. 26
    • Federal Information Processing Standards Publication (FIPS 197) Advanced Encryption Standard (AES), Nov. 26, 2001
    • (2001)
  • 16
    • 1542396925 scopus 로고    scopus 로고
    • Research on evolutionary cryptosystems and evolutionary DES
    • in Chinese
    • Zhang H G, Feng X T, Qin Z P, et al. Research on evolutionary cryptosystems and evolutionary DES. Chin J Comput (in Chinese), 2003, 26(12): 1678-1684
    • (2003) Chin J Comput , vol.26 , Issue.12 , pp. 1678-1684
    • Zhang, H.G.1    Feng, X.T.2    Qin, Z.P.3
  • 17
    • 12144263316 scopus 로고    scopus 로고
    • Design bent function using evolving method
    • Meng Q S, Zhang H G, Qin Z P, et al. Design bent function using evolving method. Acta Elect Sin (in Chinese), 2004, 32(11): 1901-1903
    • (2004) Acta Elect Sin (in Chinese) , vol.32 , Issue.11 , pp. 1901-1903
    • Meng, Q.S.1    Zhang, H.G.2    Qin, Z.P.3
  • 18
    • 33947580360 scopus 로고    scopus 로고
    • Evolutionary random number generator based on LFSR
    • Zhang H G, Wang Y H, Wang B J, et al. Evolutionary random number generator based on LFSR. Wuhan Univ J Natur Sci, 2007, 12(1): 179-182
    • (2007) Wuhan Univ J Natur Sci , vol.12 , Issue.1 , pp. 179-182
    • Zhang, H.G.1    Wang, Y.H.2    Wang, B.J.3
  • 19
    • 34547351890 scopus 로고    scopus 로고
    • Luo Q B, Zhang J Z, Zhou J. Complexity Analysis of the Chaotic Key Sequence, CHINACRYPT'2006 (in Chinese). Beijing: Press of Science and Technology of China, 2006
    • Luo Q B, Zhang J Z, Zhou J. Complexity Analysis of the Chaotic Key Sequence, CHINACRYPT'2006 (in Chinese). Beijing: Press of Science and Technology of China, 2006
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystems. Comm ACM, 1978, 21: 120-126
    • (1978) Comm ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 23
    • 0018019325 scopus 로고
    • Hiding information and signatures in trap dorr knapsacks
    • Merkle R C, Hellman M E. Hiding information and signatures in trap dorr knapsacks. IEEE Trans Inform Theory, 1978, 24(5): 525-530
    • (1978) IEEE Trans Inform Theory , vol.24 , Issue.5 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.E.2
  • 24
    • 34547280630 scopus 로고
    • Digitalized signatures and public key functions as intractable as factorization. Technical Report LCS/TR212, Cambridge MA , MIT
    • Rabin M O. Digitalized signatures and public key functions as intractable as factorization. Technical Report LCS/TR212, Cambridge MA (1979), MIT
    • (1979)
    • Rabin, M.O.1
  • 25
    • 84874800178 scopus 로고
    • A public key cryptosystem and signature scheme based on discrete logarithms
    • ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans Inform Theory, 1985, IT-31(4): 469-472
    • (1985) IEEE Trans Inform Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 26
    • 0000112683 scopus 로고
    • Elliptic curve cryptosystem
    • Koblitz N. Elliptic curve cryptosystem. Math Comput, 1978, 48: 203-209
    • (1978) Math Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 27
    • 34547306208 scopus 로고    scopus 로고
    • McEliece R J. A public key cryptosystem based on algebraic coding theory. DSN Progress Rep. 42-44, Jet Propulsion Lab, 1978, 114-116
    • McEliece R J. A public key cryptosystem based on algebraic coding theory. DSN Progress Rep. 42-44, Jet Propulsion Lab, 1978, 114-116
  • 28
    • 0037488744 scopus 로고
    • A finite automaton public key cryptosystem and digital signatures
    • Tao R J, Chen S H. A finite automaton public key cryptosystem and digital signatures. Chin J Comput (in Chinese), 1985, 8(6): 401-409
    • (1985) Chin J Comput (in Chinese) , vol.8 , Issue.6 , pp. 401-409
    • Tao, R.J.1    Chen, S.H.2
  • 29
    • 0042689537 scopus 로고    scopus 로고
    • The multi-dimension RSA and its low exponent security
    • Cao Z F. The multi-dimension RSA and its low exponent security. Sci China Ser E-Tech Sci, 2000, 43(4): 349-354
    • (2000) Sci China Ser E-Tech Sci , vol.43 , Issue.4 , pp. 349-354
    • Cao, Z.F.1
  • 30
    • 0035416443 scopus 로고    scopus 로고
    • A threshold key escrow scheme based on public key cryptosystem
    • Cao Z F. A threshold key escrow scheme based on public key cryptosystem. Sci China Ser E-Tech Sci, 2001, 44(4): 441-448
    • (2001) Sci China Ser E-Tech Sci , vol.44 , Issue.4 , pp. 441-448
    • Cao, Z.F.1
  • 31
    • 14244261730 scopus 로고    scopus 로고
    • A public key cryptosystem based on a conic over finite fields Fp
    • in Chinese, Beijing: Science Press
    • Cao Z F. A public key cryptosystem based on a conic over finite fields Fp. In: Advances in Cryptology-Chinacrypt'98 (in Chinese). Beijing: Science Press, 1998. 45-49
    • (1998) Advances in Cryptology-Chinacrypt'98 , pp. 45-49
    • Cao, Z.F.1
  • 32
    • 10444228993 scopus 로고    scopus 로고
    • Conic analog of RSA cryptosystem and some improved RSA cryptosystems
    • Cao Z F. Conic analog of RSA cryptosystem and some improved RSA cryptosystems. J Heilongjiang Univ (in Chinese), 1999, 16(4): 15-18
    • (1999) J Heilongjiang Univ (in Chinese) , vol.16 , Issue.4 , pp. 15-18
    • Cao, Z.F.1
  • 33
    • 34547297665 scopus 로고    scopus 로고
    • Cao Z F, Zhang Biao. MC public key cryptosystem based on Chinese remainder theorem. In: Advances in Cryptology-CHINACRYPT'2000 (in Chinese). Beijing: Science Press, 2000. 29-33
    • Cao Z F, Zhang Biao. MC public key cryptosystem based on Chinese remainder theorem. In: Advances in Cryptology-CHINACRYPT'2000 (in Chinese). Beijing: Science Press, 2000. 29-33
  • 34
    • 33744930359 scopus 로고    scopus 로고
    • Construct secure proxy cryptosystem
    • 3822. Berlin: Springer-Verlag
    • Zhou Y, Cao Z F, Chai Z C. Construct secure proxy cryptosystem. CISC 2005, Lecture Notes in Computer Science, Vol. 3822. Berlin: Springer-Verlag, 2005. 150-161
    • (2005) Lecture Notes in Computer Science , vol.CISC 2005 , pp. 150-161
    • Zhou, Y.1    Cao, Z.F.2    Chai, Z.C.3
  • 35
    • 34547353166 scopus 로고
    • in Chinese, Harbin: Helongjiang Education Press
    • Cao Z F. Public Key Cryptosystem (in Chinese). Harbin: Helongjiang Education Press, 1993
    • (1993) Public Key Cryptosystem
    • Cao, Z.F.1
  • 36
    • 12344258539 scopus 로고
    • Efficient identification and signature for smart cards
    • Schnorr C P. Efficient identification and signature for smart cards. J Cryptograp, 1991, 4(3): 161-174
    • (1991) J Cryptograp , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 37
    • 0003508562 scopus 로고    scopus 로고
    • NIST, DSS, Federal Information Processing Standards Publication
    • NIST. Digital Signature Standard (DSS), Federal Information Processing Standards Publication, 186
    • Digital Signature Standard , pp. 186
  • 38
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures: Delegation of the power to sign messages
    • Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages. IEICE Trans Fundam, 1996, E79-A(9): 1338-1354
    • (1996) IEICE Trans Fundam , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 39
    • 33846118746 scopus 로고    scopus 로고
    • Shao J, Cao Z F, Lu R X. Improvement of Yang et al.'s threshold proxy signature scheme. J Systems Software, 2007, 80: 172-177
    • Shao J, Cao Z F, Lu R X. Improvement of Yang et al.'s threshold proxy signature scheme. J Systems Software, 2007, 80: 172-177
  • 40
    • 0020915882 scopus 로고
    • Blind signatures for untraceable payments
    • New York: Plenum Press
    • Chaum D. Blind signatures for untraceable payments. In: Crypto'82. New York: Plenum Press, 1993. 199-203
    • (1993) Crypto'82 , pp. 199-203
    • Chaum, D.1
  • 41
    • 33749458214 scopus 로고    scopus 로고
    • Provably secure robust threshold partial blind signature
    • Cao Z F, Zhu H J, Lu R X. Provably secure robust threshold partial blind signature. Sci China Ser F-Inf Sci, 2006, 49(5): 604-615
    • (2006) Sci China Ser F-Inf Sci , vol.49 , Issue.5 , pp. 604-615
    • Cao, Z.F.1    Zhu, H.J.2    Lu, R.X.3
  • 42
    • 34547378369 scopus 로고    scopus 로고
    • Liang X H, Cao Z F, Chai Z C, et al. ID-based threshold blind signature scheme from bilinear pair. In: ChinaCrypto'2006, 2006. 244-252
    • Liang X H, Cao Z F, Chai Z C, et al. ID-based threshold blind signature scheme from bilinear pair. In: ChinaCrypto'2006, 2006. 244-252
  • 43
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Advances in Cryptography, Eurocrypt 2003, Berlin: Springer-Verlag
    • Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptography - Eurocrypt 2003, LNCS 2656. Berlin: Springer-Verlag, 2003. 416-432
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3
  • 44
    • 0010252194 scopus 로고
    • Undeniable signatures
    • CRYPTO'89, Berlin: Springer-Verlag
    • Chaum D, van Antwerpen H. Undeniable signatures. In: CRYPTO'89, LNCS 435. Berlin: Springer-Verlag, 1989. 212-216
    • (1989) LNCS , vol.435 , pp. 212-216
    • Chaum, D.1    van Antwerpen, H.2
  • 45
    • 10444252573 scopus 로고    scopus 로고
    • Threshold undeniable signature scheme based on coni
    • Lu R X, Cao Z F, Zhou Y. Threshold undeniable signature scheme based on coni. Appl Math Comput, 2005, 162(1): 165-177
    • (2005) Appl Math Comput , vol.162 , Issue.1 , pp. 165-177
    • Lu, R.X.1    Cao, Z.F.2    Zhou, Y.3
  • 46
    • 79958074367 scopus 로고
    • A forward-secure digital signature scheme
    • CRYPTO'99, Berlin: Springer-Verlag
    • Bellare M, Miner S. A forward-secure digital signature scheme. In: CRYPTO'99, LNCS 1666. Berlin: Springer-Verlag, 1999. 431-448
    • (1666) LNCS , pp. 431-448
    • Bellare, M.1    Miner, S.2
  • 47
    • 33750070723 scopus 로고    scopus 로고
    • Chai Z C, Cao Z F. Factoring-based proxy signature schemes with forward-security. In: Zhang J, et al. eds. CIS'2004, Lecture Notes in Computer Science, 3314. Berlin, Heidelberg: Springer-Verlag, 2004. 1034-1040
    • Chai Z C, Cao Z F. Factoring-based proxy signature schemes with forward-security. In: Zhang J, et al. eds. CIS'2004, Lecture Notes in Computer Science, Vol. 3314. Berlin, Heidelberg: Springer-Verlag, 2004. 1034-1040
  • 48
    • 35248813300 scopus 로고    scopus 로고
    • Strong key-insulated signature schemes
    • Public Key Cryptography, PKC 2003, Berlin: Springer-Verlag
    • Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes. In: Public Key Cryptography - PKC 2003, LNCS 2567. Berlin: Springer-Verlag, 2003. 130-144
    • (2003) LNCS , vol.2567 , pp. 130-144
    • Dodis, Y.1    Katz, J.2    Xu, S.3
  • 49
    • 84880883264 scopus 로고    scopus 로고
    • Improved online/offline signature schemes
    • Proceedings of Advances in Cryptology: Crypto'01, Berlin: Springer-Verlag
    • Shamir A, Tauman Y Improved online/offline signature schemes. In: Proceedings of Advances in Cryptology: Crypto'01, LNCS 2139. Berlin: Springer-Verlag, 2001. 355-367
    • (2001) LNCS , vol.2139 , pp. 355-367
    • Shamir, A.1    Tauman, Y.2
  • 50
    • 85032188633 scopus 로고
    • Society and group oriented cryptography: A new concept
    • Crypto'87, Berlin: Springer-Verlag
    • Desmedt Y. Society and group oriented cryptography: a new concept. In: Crypto'87, LNCS 293. Berlin: Springer-Verlag, 1988. 120-127
    • (1988) LNCS , vol.293 , pp. 120-127
    • Desmedt, Y.1
  • 51
    • 33845956283 scopus 로고    scopus 로고
    • Simulatability and security of certificateless threshold signatures
    • Wang L C, Cao Z F, Li X X et al. Simulatability and security of certificateless threshold signatures. Inform Sci, 2007, 177(6): 1382-1394
    • (2007) Inform Sci , vol.177 , Issue.6 , pp. 1382-1394
    • Wang, L.C.1    Cao, Z.F.2    Li, X.X.3
  • 52
    • 33646940989 scopus 로고    scopus 로고
    • A traceable threshold signature scheme with multiple signing policies
    • Shao J, Cao Z F. A traceable threshold signature scheme with multiple signing policies. Comput Secur, 2006, 25(3): 201-206
    • (2006) Comput Secur , vol.25 , Issue.3 , pp. 201-206
    • Shao, J.1    Cao, Z.F.2
  • 53
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • ASIACRYPT, Berlin: Springer-Verlag
    • Rivest R, Shamir A, Tauman Y. How to leak a secret. In: ASIACRYPT 2001, LNCS 2248. Berlin: Springer-Verlag, 2001. 552-565
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 54
    • 34547374166 scopus 로고    scopus 로고
    • Lu R X, Cao Z F, Dong X L. Pairing-based proxy ring signature scheme with proxy signer privacy protection. In: China-Crypto'2006, 2006. 1-10
    • Lu R X, Cao Z F, Dong X L. Pairing-based proxy ring signature scheme with proxy signer privacy protection. In: China-Crypto'2006, 2006. 1-10
  • 55
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • EUROCRYPT'96, Berlin: Springer-Verlag
    • Jakobsson M, Sako K, Impagliazzo R. Designated verifier proofs and their applications. In: EUROCRYPT'96, LNCS 1070. Berlin: Springer-Verlag, 1996. 143-154
    • (1996) LNCS , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 57
    • 84948970342 scopus 로고
    • Designated confirmer signatures
    • Eurocypt'94, Berlin: Springer-Verlag
    • Chaum D. Designated confirmer signatures. In: Eurocypt'94, LNCS 950. Berlin: Springer-Verlag, 1995. 86-91
    • (1995) LNCS , vol.950 , pp. 86-91
    • Chaum, D.1
  • 59
    • 34547292967 scopus 로고    scopus 로고
    • ITU-T, Rec. X.509 (revised) the Directory - Authentication Framework, 1993, International Telecommunication Union, Geneva, Switzerland
    • ITU-T, Rec. X.509 (revised) the Directory - Authentication Framework, 1993, International Telecommunication Union, Geneva, Switzerland
  • 60
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptography, Crypto'84, Berlin: Springer-Verlag
    • Shamir A. Identity-based cryptosystems and signature schemes. In: Advances in Cryptography - Crypto'84, LNCS 196. Berlin: Springer-Verlag, 1984. 47-53
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 61
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh D, Franklin M. Identity-based encryption from the Weil pairing, SIAM. J Comput, 2003, 32(3): 586-615
    • (2003) SIAM. J Comput , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 63
    • 84885943723 scopus 로고    scopus 로고
    • Efficient ID-based one-time proxy signature and its application in E-cheque
    • 5th International Conference on Cryptology and Network Security, CANS
    • Lu R X, Cao Z F, Dong X L. Efficient ID-based one-time proxy signature and its application in E-cheque. In: 5th International Conference on Cryptology and Network Security - CANS 2006, Lecture Notes in Computer Science, Vol. 4301. 2006, 153-167
    • (2006) Lecture Notes in Computer Science , vol.4301 , pp. 153-167
    • Lu, R.X.1    Cao, Z.F.2    Dong, X.L.3
  • 64
    • 33746324583 scopus 로고    scopus 로고
    • Efficient and provably secure multi-receiver identity-based signcryption. ACISP 2006
    • Duan S S, Cao Z F. Efficient and provably secure multi-receiver identity-based signcryption. ACISP 2006, Lecture Notes in Computer Science, Vol. 4058. 2006, 195-206
    • (2006) Lecture Notes in Computer Science , vol.4058 , pp. 195-206
    • Duan, S.S.1    Cao, Z.F.2
  • 65
    • 35048840186 scopus 로고    scopus 로고
    • Identity-based threshold decryption
    • Practice and Theory in Public Key Cryptography-PKC'2004, Singapore SG, March, Berlin: Springer-Verlag
    • Baek J, Zheng Y. Identity-based threshold decryption. In: Practice and Theory in Public Key Cryptography-PKC'2004, Singapore (SG), March 2004, LNCS 2947. Berlin: Springer-Verlag, 2004. 262-276
    • (2004) LNCS , vol.2947 , pp. 262-276
    • Baek, J.1    Zheng, Y.2
  • 66
    • 0345490607 scopus 로고    scopus 로고
    • Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In: Advances in Cryptology - Asiacrypt'2003, LNCS 2894. Berlin: Springer-Verlag, 2003. 452-473
    • Al-Riyami S S, Paterson K G. Certificateless public key cryptography. In: Advances in Cryptology - Asiacrypt'2003, LNCS 2894. Berlin: Springer-Verlag, 2003. 452-473
  • 69
    • 0343337504 scopus 로고    scopus 로고
    • Non-malleable cryptography
    • Dolev D, Dwork C, Naor M. Non-malleable cryptography. SIAM J Comput, 2000, 30(2): 391-437
    • (2000) SIAM J Comput , vol.30 , Issue.2 , pp. 391-437
    • Dolev, D.1    Dwork, C.2    Naor, M.3
  • 70
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput, 1988, 17(2): 281-308
    • (1988) SIAM J Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 71
    • 84947237328 scopus 로고    scopus 로고
    • On the security of joint signature and encryption
    • Advances in Cryptology, EUROCRYPT'02, Berlin: Springer-Verlag
    • An J, Dodis Y, Rabin T. On the security of joint signature and encryption. In: Advances in Cryptology - EUROCRYPT'02, LNCS 2332. Berlin: Springer-Verlag, 2002. 83-107
    • (2002) LNCS , vol.2332 , pp. 83-107
    • An, J.1    Dodis, Y.2    Rabin, T.3
  • 73
    • 0005078946 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology, Crypto 1993, Berlin: Springer-Verlag
    • Bellare M, Rogaway P. Entity authentication and key distribution. In: Advances in Cryptology - Crypto 1993, LNCS 773. Berlin: Springer-Verlag, 1993, 110-125
    • (1993) LNCS , vol.773 , pp. 110-125
    • Bellare, M.1    Rogaway, P.2
  • 74
    • 0001940580 scopus 로고
    • Provably secure session key distribution: The three party case
    • New York: ACM Press
    • Bellare M, Rogaway P. Provably secure session key distribution: The three party case. In: 27th ACM Symposium on the Theory of Computing. New York: ACM Press, 1995. 57-66
    • (1995) 27th ACM Symposium on the Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 75
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology, Eurocrypt 2000, Berlin: Springer-Verlay
    • Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In: Advances in Cryptology - Eurocrypt 2000 LNCS 1807. Berlin: Springer-Verlay, 2000. 139-155
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 76
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology-Eurocrypt 2001, Berlin: Springer-Verlag
    • Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Advances in Cryptology-Eurocrypt 2001 LNCS 2045. Berlin: Springer-Verlag, 2001. 453-474
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 77
    • 33646805409 scopus 로고    scopus 로고
    • Examining indistinguishability-based proof models for key establishment protocols
    • Advances in Cryptology, Asiacrypt 2005, Berlin: Springer-Verlag
    • Choo K K R, Boyd C, Hitchcock Y Examining indistinguishability-based proof models for key establishment protocols. In: Advances in Cryptology - Asiacrypt 2005, LNCS 3788. Berlin: Springer-Verlag, 2005. 585-604
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 79
    • 33846817471 scopus 로고    scopus 로고
    • Simple three-party key exchange protocol
    • Lu R X, Cao Z F. Simple three-party key exchange protocol. Comput Secur, 2007, 26(1): 94-97
    • (2007) Comput Secur , vol.26 , Issue.1 , pp. 94-97
    • Lu, R.X.1    Cao, Z.F.2
  • 80
    • 24344478593 scopus 로고    scopus 로고
    • Efficient remote user authentication scheme using smart card
    • Lu R X, Cao Z F. Efficient remote user authentication scheme using smart card. Comput Networks, 2005, 49(4): 535-540
    • (2005) Comput Networks , vol.49 , Issue.4 , pp. 535-540
    • Lu, R.X.1    Cao, Z.F.2
  • 81
    • 33845638410 scopus 로고    scopus 로고
    • An improved deniable authentication protocol
    • Shao J, Cao Z F, Lu R X. An improved deniable authentication protocol. Networks, 2006, 48(4): 179-181
    • (2006) Networks , vol.48 , Issue.4 , pp. 179-181
    • Shao, J.1    Cao, Z.F.2    Lu, R.X.3
  • 83
    • 84990731886 scopus 로고
    • How to prove yourself: {Practical} solutions to identification and signature problems
    • Berlin: Springer-Verlag
    • Fiat A, Shamir A. How to prove yourself: {Practical} solutions to identification and signature problems. In: Advances in Cryptology - Crypto'86. Berlin: Springer-Verlag, 1986. 186-194
    • (1986) Advances in Cryptology - Crypto'86 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 85
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Advance in Cryptology-Crypto'98, Berlin: Springer-Verlag
    • Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Advance in Cryptology-Crypto'98, LNCS 1462. Berlin: Springer-Verlag, 1998. 13-25
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 86
    • 35048835319 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracle
    • Advances in Wyptology CRYPTO 2004, Berlin: Springer-verlag
    • Water B. Efficient identity-based encryption without random oracle. In: Advances in Wyptology CRYPTO 2004 LNCS 3152. Berlin: Springer-verlag, 2004. 443-459
    • (2004) LNCS , vol.3152 , pp. 443-459
    • Water, B.1
  • 87
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Advance in Cryptology- Eurocrypt'04
    • Boneh D, Boyen X. Short signatures without random oracles. In: Advance in Cryptology- Eurocrypt'04, LNCS 3027, 2004. 56-73
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 88
    • 34547295398 scopus 로고    scopus 로고
    • Identity Authentication Without Lost of Quantum Channel
    • Beijing: Science Press
    • Zeng G H. Quantum Identity Authentication Without Lost of Quantum Channel. In: CHINACRYPT'2004. Beijing: Science Press, 2004
    • (2004) CHINACRYPT
    • Zeng, G.1    Quantum, H.2
  • 89
    • 34547315374 scopus 로고    scopus 로고
    • DNA computing and DNA code
    • Xiao G Z, Lu M X. DNA computing and DNA code. J Engin Math, 2006, 23(1): 1-6
    • (2006) J Engin Math , vol.23 , Issue.1 , pp. 1-6
    • Xiao, G.Z.1    Lu, M.X.2
  • 90
    • 34547259065 scopus 로고    scopus 로고
    • Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA: DOD, December 1985
    • Department of Defense Computer Security Center. DoD 5200.28-STD. Department of Defense Trusted Computer System Evaluation Criteria [S]. USA: DOD, December 1985
  • 91
    • 34547306206 scopus 로고    scopus 로고
    • National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. USA: DOD, April 1991
    • National Computer Security Center. NCSC-TG-021. Trusted Database Management System Interpretation [S]. USA: DOD, April 1991
  • 92
    • 34547363433 scopus 로고    scopus 로고
    • National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. USA: DOD, July 1987
    • National Computer Security Center. NCSC-TG-005. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria [S]. USA: DOD, July 1987
  • 93
    • 34547311571 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/
    • Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2005-03-01]. https://www.trustedcomputinggroup.org/
  • 94
    • 34547297661 scopus 로고    scopus 로고
    • The Open Trusted Computing (OpenTC) consortium. General activities of OpenTC [EB/OL]. [2006-3-1]. http://www.opentc.net/activities/
    • The Open Trusted Computing (OpenTC) consortium. General activities of OpenTC [EB/OL]. [2006-3-1]. http://www.opentc.net/activities/
  • 95
    • 34547296881 scopus 로고    scopus 로고
    • Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25]. http://www.microsoft.com/resources/ngscb/
    • Microsoft. Trusted Platform Module Services in Windows Longhom [EB/OL]. [2005-4-25]. http://www.microsoft.com/resources/ngscb/
  • 96
    • 34547358537 scopus 로고    scopus 로고
    • Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2004-5-1]. http://www.intel.com/technology/security/
    • Intel Corporation. LaGrande Technology Architectural Overview [EB/OL]. [2004-5-1]. http://www.intel.com/technology/security/
  • 97
  • 98
    • 34547319246 scopus 로고    scopus 로고
    • Zhang H G, Luo J, Jin G, et al. Development of trusted computing research. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2006, 52(5): 513-518
    • Zhang H G, Luo J, Jin G, et al. Development of trusted computing research. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2006, 52(5): 513-518
  • 99
    • 34547289402 scopus 로고    scopus 로고
    • Zhang H G, Wu G Q, Qin Z P, et al. Anew type of secure microcomputer. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 1-6
    • Zhang H G, Wu G Q, Qin Z P, et al. Anew type of secure microcomputer. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 1-6
  • 100
    • 34547285342 scopus 로고    scopus 로고
    • Zhan H G, Liu Y Z, Yu F J, et al. A new type of embedded secure module. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 7-11
    • Zhan H G, Liu Y Z, Yu F J, et al. A new type of embedded secure module. In: Proc. of First Chinese Conference on Trusted Computing and Information Security. J Wuhan Univ (Nat Sei Ed) (in Chinese), 2004, 50(s1): 7-11
  • 101
    • 33846133227 scopus 로고    scopus 로고
    • An improved grid security infrastructure by trusted computing
    • Yan F, Zhang H G, Sun Q, et al. An improved grid security infrastructure by trusted computing. Wuhan Univ J Nat Sci, 2006, 11(6):1805-1808
    • (2006) Wuhan Univ J Nat Sci , vol.11 , Issue.6 , pp. 1805-1808
    • Yan, F.1    Zhang, H.G.2    Sun, Q.3
  • 104
    • 0242439292 scopus 로고    scopus 로고
    • Research of subjective trust management model based on the fuzzy set theory
    • Tang W, Chen Z. Research of subjective trust management model based on the fuzzy set theory. J Software (in Chinese), 2003, 14(8): 1401-1408
    • (2003) J Software (in Chinese) , vol.14 , Issue.8 , pp. 1401-1408
    • Tang, W.1    Chen, Z.2
  • 107
    • 34250002868 scopus 로고    scopus 로고
    • in Chinese, Beijing: The Electronic Industry Press
    • Qu Y W. Software Behavior (in Chinese). Beijing: The Electronic Industry Press, 2004
    • (2004) Software Behavior
    • Qu, Y.W.1
  • 108
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy network
    • Lin C, Peng X H. Research on trustworthy network. Chine J Comput (in Chinese), 2005, 28(5): 751-758
    • (2005) Chine J Comput (in Chinese) , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.H.2
  • 109
    • 24744467831 scopus 로고    scopus 로고
    • The high trusted software engineer
    • Chen H W, Wang J, Dong W. The high trusted software engineer. Acta Elect Sin, 2003, 31(12): 1933-1938
    • (2003) Acta Elect Sin , vol.31 , Issue.12 , pp. 1933-1938
    • Chen, H.W.1    Wang, J.2    Dong, W.3
  • 112
    • 33750083297 scopus 로고    scopus 로고
    • Progress and Prospect on Information Security Research in China
    • Feng D G, Wang X Y. Progress and Prospect on Information Security Research in China. J Comput Sci Tech, 2006, 21(5): 740-755
    • (2006) J Comput Sci Tech , vol.21 , Issue.5 , pp. 740-755
    • Feng, D.G.1    Wang, X.Y.2
  • 113
    • 3042624656 scopus 로고    scopus 로고
    • Securing the high-speed internet
    • Shim S S Y, Gong L, Rubin A D, et al. Securing the high-speed internet. IEEE Comput, 2004, 37(6): 33-35
    • (2004) IEEE Comput , vol.37 , Issue.6 , pp. 33-35
    • Shim, S.S.Y.1    Gong, L.2    Rubin, A.D.3
  • 115
    • 10744232231 scopus 로고    scopus 로고
    • Energy-efficient area monitoring for sensor networks
    • Carle J, Simplot-Ryl D. Energy-efficient area monitoring for sensor networks. IEEE Comput, 2004, 37(2): 40-46
    • (2004) IEEE Comput , vol.37 , Issue.2 , pp. 40-46
    • Carle, J.1    Simplot-Ryl, D.2
  • 116
    • 4344668572 scopus 로고    scopus 로고
    • WiseNET: An ultralow-power wireless sensor network solution
    • Enz C C, El-Hoiydi A, Decotignie J, et al. WiseNET: an ultralow-power wireless sensor network solution. IEEE Comput, 2004, 37(8): 62-70
    • (2004) IEEE Comput , vol.37 , Issue.8 , pp. 62-70
    • Enz, C.C.1    El-Hoiydi, A.2    Decotignie, J.3
  • 119
    • 34547361662 scopus 로고    scopus 로고
    • A guide to understanding covert channel analysis of trusted systems. National Computer Security Center. NCSC-TG-030
    • A guide to understanding covert channel analysis of trusted systems. National Computer Security Center. NCSC-TG-030
  • 122
    • 0032095654 scopus 로고    scopus 로고
    • Multimedia data embedding and watermarking technologies
    • Swanson M D, Kobayashi M, Tewfik A. H. Multimedia data embedding and watermarking technologies. Proc. IEEE, 1998, 86(6): 1064-1087
    • (1998) Proc. IEEE , vol.86 , Issue.6 , pp. 1064-1087
    • Swanson, M.D.1    Kobayashi, M.2    Tewfik, A.H.3
  • 123
    • 84904224992 scopus 로고    scopus 로고
    • Steganalysis of images created using current steganography software
    • Proc. of 2nd International Workshop on Information Hiding
    • Johnson N F, Jajodia S. Steganalysis of images created using current steganography software. In: Proc. of 2nd International Workshop on Information Hiding. LNCS 1525, 1998. 273-289
    • (1998) LNCS , vol.1525 , pp. 273-289
    • Johnson, N.F.1    Jajodia, S.2
  • 124
    • 0030384775 scopus 로고    scopus 로고
    • Techniques for data hiding
    • Bender W, Gruhl D, Morimoto N, et al. Techniques for data hiding. IBM System J, 1996, 35(3/4): 313-337
    • (1996) IBM System J , vol.35 , Issue.3-4 , pp. 313-337
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3
  • 125
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Cox I J, Killian J, Leighton F T, et al. Secure spread spectrum watermarking for multimedia. IEEE Trans Image Proc, 1997, 6(12): 1673-1687
    • (1997) IEEE Trans Image Proc , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Killian, J.2    Leighton, F.T.3
  • 126
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • Chen B, Wornell G W. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans Inform Theory, 2001, 47(4): 1423-1443
    • (2001) IEEE Trans Inform Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.