-
1
-
-
36348974345
-
-
United States Department of Defense (2006) National Industrial Security Program Operating Manual. DoD 5220.22-M
-
United States Department of Defense (2006) National Industrial Security Program Operating Manual. DoD 5220.22-M
-
-
-
-
2
-
-
36348954757
-
The Ephemerizer: Making Data Disappear
-
Perlman R (2005) The Ephemerizer: Making Data Disappear. Journal of Information System Security, Vol. 1 (1), pp. 51-68
-
(2005)
Journal of Information System Security
, vol.1
, Issue.1
, pp. 51-68
-
-
Perlman, R.1
-
4
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Advances in Cryptology, Crypto, 1109, Springer-Verlag, pp
-
Bellare M, Canetti R, Krawczyk H (1996) Keying Hash Functions for Message Authentication. Advances in Cryptology - Crypto 96, LNCS 1109, Springer-Verlag, pp. 1-15
-
(1996)
LNCS
, vol.96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
84957086893
-
How to Forget a Secret
-
International Symposium on Theoretical Aspects of Computer Science, Springer-Verlag, pp
-
Crescenzo GD, Ferguson N, Impagliazzo R, Jakobsson M (1999) How to Forget a Secret. International Symposium on Theoretical Aspects of Computer Science, LNCS 1563, Springer-Verlag, pp. 500-509
-
(1999)
LNCS
, vol.1563
, pp. 500-509
-
-
Crescenzo, G.D.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
-
6
-
-
85020598353
-
Identity-based Cryptosystems and Signature Schemes
-
Advances in Cryptology, Crypto, 196, Springer-Verlag, pp
-
Shamir A (1984) Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology - Crypto 84, LNCS 196, Springer-Verlag, pp. 47-53
-
(1984)
LNCS
, vol.84
, pp. 47-53
-
-
Shamir, A.1
-
7
-
-
84874324906
-
Identity-based Encryption from Weil Pairing
-
Advances in Cryptology, Crypto 2001, Springer-Verlag, pp
-
Boneh D, Franklin F (2001) Identity-based Encryption from Weil Pairing. Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, pp. 213-229
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, F.2
-
9
-
-
0032649638
-
The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems
-
Frey G, Muller M, Ruck H (1999) The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information Theory, 45(5)L1717-9
-
(1999)
IEEE Transactions on Information Theory
, vol.45
, Issue.5
-
-
Frey, G.1
Muller, M.2
Ruck, H.3
-
10
-
-
84944050090
-
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
-
Springer-Verlag, pp
-
Chen L, Harrison K, Smart NP, Soldera D (2002) Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. InfraSec 2002, LNCS 2437, Springer-Verlag, pp. 260-275
-
(2002)
LNCS. InfraSec 2002
, vol.2437
, pp. 260-275
-
-
Chen, L.1
Harrison, K.2
Smart, N.P.3
Soldera, D.4
-
11
-
-
35248866223
-
Certificate-based Encryption and the Certificate Revocation Problem
-
LNCS 25656 Advances in Cryptology, Eurocrypt 2003, Springer-Verlag
-
Gentry C (2003) Certificate-based Encryption and the Certificate Revocation Problem. Advances in Cryptology - Eurocrypt 2003, LNCS 25656, Springer-Verlag, pp. 272-293
-
(2003)
LNCS
, pp. 272-293
-
-
Gentry, C.1
-
12
-
-
0345490607
-
Certificateless Public Key Cryptography
-
Advances in Cryptology, Asiacrypt 2003, Springer-Verlag, pp
-
Al-Riyani S, Paterson K (2003) Certificateless Public Key Cryptography. Advances in Cryptology - Asiacrypt 2003, LNCS 2894, Springer-Verlag, pp. 452-473
-
(2003)
LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyani, S.1
Paterson, K.2
-
13
-
-
0035474388
-
Building the IBM 4758 Secure Coprocessor
-
Dyer J, Lindemann M, Perez R, Sailer R, van Doorn L, Smith SW, Weingart S (2001) Building the IBM 4758 Secure Coprocessor. IEEE Computer Vol. 34, no. 10, pp. 57-66
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
van Doorn, L.5
Smith, S.W.6
Weingart, S.7
-
15
-
-
33746332056
-
Identity-Based Encryption Gone Wild. Automata
-
Languages and Programming: 33rd International Colloquium, Springer-Verlag, pp
-
Abdalla M, Catalano D, Dent AW, Malone-Lee J, Neven G, Smart NP (2006) Identity-Based Encryption Gone Wild. Automata, Languages and Programming: 33rd International Colloquium, LNCS 4052, Springer-Verlag, pp. 300-311
-
(2006)
LNCS
, vol.4052
, pp. 300-311
-
-
Abdalla, M.1
Catalano, D.2
Dent, A.W.3
Malone-Lee, J.4
Neven, G.5
Smart, N.P.6
-
16
-
-
36348940800
-
-
Trusted Computing Group
-
Trusted Computing Group (2006) http://www.trustedcomputinggroup.org
-
(2006)
-
-
-
17
-
-
36348983635
-
-
Trusted Computing Group (2006) Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, Version 1.2, Revision 94. http://www.trustedcomputinggroup.org
-
Trusted Computing Group (2006) Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, Version 1.2, Revision 94. http://www.trustedcomputinggroup.org
-
-
-
-
18
-
-
85084162270
-
Design and Implementation of a TCG-Based Integrity Measurement Architecture
-
USENIX, pp
-
Sailer R, Zhang X, Jaeger T, van Doorn L (2004), Design and Implementation of a TCG-Based Integrity Measurement Architecture. 13th Usenix Security Symposium, USENIX, pp. 223-238
-
(2004)
13th Usenix Security Symposium
, pp. 223-238
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
van Doorn, L.4
|