메뉴 건너뛰기




Volumn 2776, Issue , 2003, Pages 419-423

Authentication of anycast communication

Author keywords

Anycast; Authentication; Proxy signature

Indexed keywords

AUTHENTICATION; BANDWIDTH; COMPUTER CRIME; NETWORK SECURITY;

EID: 35248843031     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-45215-7_36     Document Type: Article
Times cited : (4)

References (9)
  • 4
    • 0010567510 scopus 로고    scopus 로고
    • Proxy signatures, Revisted
    • ICICS'97, Springer-Verlag
    • Kim, S., Park, S., and Won, D.: Proxy signatures, Revisted. In ICICS'97, Springer-Verlag, LNCS, vol. 1334 (1997) 223-232
    • (1997) LNCS , vol.1334 , pp. 223-232
    • Kim, S.1    Park, S.2    Won, D.3
  • 6
    • 0030231965 scopus 로고    scopus 로고
    • Proxy signatures for delegating signing operation
    • Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. IEICE Trans. Fundamentals, vol. E79-A, no. 9 (1996) 1338-1354
    • (1996) IEICE Trans. Fundamentals , vol.E79-A , Issue.9 , pp. 1338-1354
    • Mambo, M.1    Usuda, K.2    Okamoto, E.3
  • 7
    • 12344258539 scopus 로고
    • Efficient Signature Generation by Smart Cards
    • Schnorr, C.: Efficient Signature Generation by Smart Cards. Journal of Cryptology, vol. 4, no. 3 (1991) 161-174
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.1
  • 8
    • 0033875604 scopus 로고    scopus 로고
    • Proxy multi-signature scheme: A new type of proxy signature scheme
    • Yi, L. Bai, G. and Xia G.: "Proxy multi-signature scheme: A new type of proxy signature scheme," Electronic letters, vol. 36, no. 6 (2000) 527-528
    • (2000) Electronic Letters , vol.36 , Issue.6 , pp. 527-528
    • Yi, L.1    Bai, G.2    Xia, G.3
  • 9
    • 0000064722 scopus 로고    scopus 로고
    • Threshold proxy signature scheme
    • proceedings of the first international informational security workshop, ISW'97, Springer-Verlag
    • Zhang, K.: Threshold proxy signature scheme. In proceedings of the first international informational security workshop, ISW'97, Springer-Verlag, LNCS, vol. 1396 (1997)
    • (1997) LNCS , vol.1396
    • Zhang, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.