-
1
-
-
85032877753
-
Non-Interactive Oblivious Transfer and Applications
-
Springer-Verlag
-
Bellare, M., Micali, S.: Non-Interactive Oblivious Transfer and Applications. Advances in Cryptology-CRYPTO '89, LNCS 435, Springer-Verlag, 1990, pp. 544-557.
-
(1990)
Advances in Cryptology-Crypto '89, LNCS
, vol.435
, pp. 544-557
-
-
Bellare, M.1
Micali, S.2
-
2
-
-
84957085257
-
An Efficient Public key Traitor Tracing Scheme
-
Springer-Verlag
-
Boneh, D., Franklin, M.: An Efficient Public key Traitor Tracing Scheme. Advances in Cryptology-EUROCRYPT '90, LNCS 1666, Springer-Verlag, 1999, pp. 338-353.
-
(1999)
Advances in Cryptology-Eurocrypt '90, LNCS
, vol.1666
, pp. 338-353
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
84957670625
-
Collusion Secure Fingerprinting For Digital Data
-
Springer-Verlag
-
Boneh, D., Shaw, J.: Collusion Secure Fingerprinting For Digital Data. Advances in Cryptology-CRYPTO '95, LNCS 963, Springer-Verlag, 1995, pp. 452-465.
-
(1995)
Advances in Cryptology-Crypto '95, LNCS
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
4
-
-
0001604533
-
Blind Signatures for Untraceable Payments
-
Plenum Press
-
Chaum, D.: Blind Signatures for Untraceable Payments. Advances in Cryptology- CRYPTO '82, Plenum Press, 1982, pp. 199-203.
-
(1982)
Advances in Cryptology- CRYPTO '82
, pp. 199-203
-
-
Chaum, D.1
-
5
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, Vol. 24(2), 1981, pp. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
84864708144
-
Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result
-
Springer-Verlag
-
Chaum, D., Damgard, I., Graaf, J.: Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. Advances in Cryptology- CRYPTO '87, LNCS 293, Springer-Verlag, 1988, pp. 87-119.
-
(1988)
Advances in Cryptology- CRYPTO '87, LNCS
, vol.293
, pp. 87-119
-
-
Chaum, D.1
Damgard, I.2
Graaf, J.3
-
7
-
-
84985922619
-
Tracing Traitors
-
Springer-Verlag
-
Chor, B., Fiat, A., Naor, M.: Tracing Traitors. Advances in Cryptology-CRYPTO '94, LNCS 293, Springer-Verlag, 1994, pp. 257-270.
-
(1994)
Advances in Cryptology-Crypto '94, LNCS
, vol.293
, pp. 257-270
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
-
9
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM, Vol. 28, 1985, pp. 637-647.
-
(1985)
Communications of the ACM
, vol.28
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
10
-
-
0023545076
-
How to Play any Mental Game -or- a Completeness Theorem for Protocols with Honest Majority
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game -or- a Completeness Theorem for Protocols with Honest Majority. 19th STOC, 1987, pp. 218-229.
-
(1987)
19th STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
11
-
-
0005063385
-
Onion Routing for Anonymous and Private Communications
-
Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Communications. Communications of the ACM, Vol. 42(2), 1999, pp. 39-41.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
12
-
-
84946882698
-
Proven Secure Tracing Algorithm For The Optimal KD Traitor Tracing Scheme
-
April 17-18
-
Kurosawa, K., Burmester, M., Demedt, Y.: Proven Secure Tracing Algorithm For The Optimal KD Traitor Tracing Scheme. DIMACS Workshop on Management of Digital Intellectual Property, April 17-18, 2000.
-
(2000)
DIMACS Workshop on Management of Digital Intellectual Property
-
-
Kurosawa, K.1
Burmester, M.2
Demedt, Y.3
-
13
-
-
84958035786
-
Optimum Traitor Tracing
-
Springer-Verlag
-
Kurosawa, K., Demedt, Y.: Optimum Traitor Tracing. Advances in Cryptology- EUROCRYPT '98, LNCS 1403, Springer-Verlag, 1999, pp. 145-157.
-
(1999)
Advances in Cryptology- EUROCRYPT '98, LNCS
, vol.1403
, pp. 145-157
-
-
Kurosawa, K.1
Demedt, Y.2
-
14
-
-
0032669864
-
Oblivious Transfer and Polynomial Evaluation
-
Naor, M., Pinkas, B.: Oblivious Transfer and Polynomial Evaluation. 31th ACM Symposium on Theory of Computing, ACM, 1999, pp. 245-254.
-
(1999)
31th ACM Symposium on Theory of Computing, ACM
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
0032680807
-
Information Hiding-A Survey
-
Peticolas, F., Anderson, R., Kuhn, M.: Information Hiding-A Survey. In Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, IEEE Vol. 87(7), 1999, pp. 1062-1078.
-
(1999)
Proceedings of the IEEE, Special Issue on Protection of Multimedia Content, IEEE
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Peticolas, F.1
Erson, R.2
Kuhn, M.3
-
16
-
-
84954420982
-
Trials of Traced Traitors
-
Springer-Verlag
-
Pfitzmann, B.: Trials of Traced Traitors. Information Hiding Workshop, LNCS 1174, Springer-Verlag, 1996, pp. 49-64.
-
(1996)
Information Hiding Workshop, LNCS
, vol.1174
, pp. 49-64
-
-
Pfitzmann, B.1
-
17
-
-
84947921515
-
Asymmetric Fingerprinting
-
Springer-Verlag
-
Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. Advances in Cryptology- EUROCRYPT '96, LNCS 1070, Springer-Verlag, 1996, pp. 84-95.
-
(1996)
Advances in Cryptology- EUROCRYPT '96, LNCS
, vol.1070
, pp. 84-95
-
-
Pfitzmann, B.1
Schunter, M.2
-
18
-
-
84957353052
-
Anonymous Fingerprinting
-
Springer-Verlag
-
Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. Advances in Cryptology- EUROCRYPT '97, LNCS 1233, Springer-Verlag, 1997, pp. 88-102.
-
(1997)
Advances in Cryptology- EUROCRYPT '97, LNCS
, vol.1233
, pp. 88-102
-
-
Pfitzmann, B.1
Waidner, M.2
-
19
-
-
0030704505
-
Asymmetric Fingerprinting for Larger Collusions
-
Pfitzmann, B., Waidner, M.: Asymmetric Fingerprinting for Larger Collusions. ACM Conference on Computer and Communication Security, ACM, 1997, pp. 151-160.
-
(1997)
ACM Conference on Computer and Communication Security, ACM
, pp. 151-160
-
-
Pfitzmann, B.1
Waidner, M.2
-
21
-
-
0010602889
-
-
LCS Technical Memo MIT/LCS/TR-684
-
Rivest, R., Shamir, A., Wagner, D.: Time-Lock Puzzles and Timed-Released Crypto. LCS Technical Memo MIT/LCS/TR-684, 1996, http://www.theory.lcs.mit.edu/~rivest/RivestShamirWagner-timelock.ps
-
(1996)
Time-Lock Puzzles and Timed-Released Crypto
-
-
Rivest, R.1
Shamir, A.2
Wagner, D.3
-
22
-
-
0002016098
-
Combinatorial Properties and Constructions for Traceability Schemes
-
Stinson, D., Wei, R.: Combinatorial Properties and Constructions for Traceability Schemes. SIAM Journal on Discrete Mathematics, Vol. 11(1), 1998, pp. 41-53.
-
(1998)
SIAM Journal on Discrete Mathematics
, vol.11
, Issue.1
, pp. 41-53
-
-
Stinson, D.1
Wei, R.2
-
23
-
-
84958055194
-
On the Efficient Implementation of Fair Non- Repudiation
-
IEEE CS Press
-
You, C., Zhou, J., Lam, K.: On the Efficient Implementation of Fair Non- Repudiation. 1997 IEEE Computer Security Foundations Workshop, IEEE CS Press, 1997, pp. 126-132.
-
(1997)
1997 IEEE Computer Security Foundations Workshop
, pp. 126-132
-
-
You, C.1
Zhou, J.2
Lam, K.3
|