메뉴 건너뛰기




Volumn 232, Issue , 2007, Pages 241-252

A hybrid PKI-IBC based ephemerizer system

Author keywords

[No Author keywords available]

Indexed keywords

IDENTITY-BASED CRYPTOSYSTEM; ORIGINAL SYSTEMS; PERSISTENT STORAGE; SECRET DATA; USER SETTING;

EID: 36349001779     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-72367-9_21     Document Type: Conference Paper
Times cited : (27)

References (18)
  • 1
    • 36348974345 scopus 로고    scopus 로고
    • United States Department of Defense (2006) National Industrial Security Program Operating Manual. DoD 5220.22-M
    • United States Department of Defense (2006) National Industrial Security Program Operating Manual. DoD 5220.22-M
  • 2
    • 36348954757 scopus 로고    scopus 로고
    • The Ephemerizer: Making Data Disappear
    • Perlman R (2005) The Ephemerizer: Making Data Disappear. Journal of Information System Security, Vol. 1 (1), pp. 51-68
    • (2005) Journal of Information System Security , vol.1 , Issue.1 , pp. 51-68
    • Perlman, R.1
  • 4
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Advances in Cryptology, Crypto, 1109, Springer-Verlag, pp
    • Bellare M, Canetti R, Krawczyk H (1996) Keying Hash Functions for Message Authentication. Advances in Cryptology - Crypto 96, LNCS 1109, Springer-Verlag, pp. 1-15
    • (1996) LNCS , vol.96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 5
    • 84957086893 scopus 로고    scopus 로고
    • How to Forget a Secret
    • International Symposium on Theoretical Aspects of Computer Science, Springer-Verlag, pp
    • Crescenzo GD, Ferguson N, Impagliazzo R, Jakobsson M (1999) How to Forget a Secret. International Symposium on Theoretical Aspects of Computer Science, LNCS 1563, Springer-Verlag, pp. 500-509
    • (1999) LNCS , vol.1563 , pp. 500-509
    • Crescenzo, G.D.1    Ferguson, N.2    Impagliazzo, R.3    Jakobsson, M.4
  • 6
    • 85020598353 scopus 로고
    • Identity-based Cryptosystems and Signature Schemes
    • Advances in Cryptology, Crypto, 196, Springer-Verlag, pp
    • Shamir A (1984) Identity-based Cryptosystems and Signature Schemes. Advances in Cryptology - Crypto 84, LNCS 196, Springer-Verlag, pp. 47-53
    • (1984) LNCS , vol.84 , pp. 47-53
    • Shamir, A.1
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based Encryption from Weil Pairing
    • Advances in Cryptology, Crypto 2001, Springer-Verlag, pp
    • Boneh D, Franklin F (2001) Identity-based Encryption from Weil Pairing. Advances in Cryptology - Crypto 2001, LNCS 2139, Springer-Verlag, pp. 213-229
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, F.2
  • 9
    • 0032649638 scopus 로고    scopus 로고
    • The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems
    • Frey G, Muller M, Ruck H (1999) The Tate Pairing and the Discrete Logarithm Applied to Elliptic Curve Cryptosystems. IEEE Transactions on Information Theory, 45(5)L1717-9
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.5
    • Frey, G.1    Muller, M.2    Ruck, H.3
  • 10
    • 84944050090 scopus 로고    scopus 로고
    • Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
    • Springer-Verlag, pp
    • Chen L, Harrison K, Smart NP, Soldera D (2002) Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. InfraSec 2002, LNCS 2437, Springer-Verlag, pp. 260-275
    • (2002) LNCS. InfraSec 2002 , vol.2437 , pp. 260-275
    • Chen, L.1    Harrison, K.2    Smart, N.P.3    Soldera, D.4
  • 11
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based Encryption and the Certificate Revocation Problem
    • LNCS 25656 Advances in Cryptology, Eurocrypt 2003, Springer-Verlag
    • Gentry C (2003) Certificate-based Encryption and the Certificate Revocation Problem. Advances in Cryptology - Eurocrypt 2003, LNCS 25656, Springer-Verlag, pp. 272-293
    • (2003) LNCS , pp. 272-293
    • Gentry, C.1
  • 12
    • 0345490607 scopus 로고    scopus 로고
    • Certificateless Public Key Cryptography
    • Advances in Cryptology, Asiacrypt 2003, Springer-Verlag, pp
    • Al-Riyani S, Paterson K (2003) Certificateless Public Key Cryptography. Advances in Cryptology - Asiacrypt 2003, LNCS 2894, Springer-Verlag, pp. 452-473
    • (2003) LNCS , vol.2894 , pp. 452-473
    • Al-Riyani, S.1    Paterson, K.2
  • 15
    • 33746332056 scopus 로고    scopus 로고
    • Identity-Based Encryption Gone Wild. Automata
    • Languages and Programming: 33rd International Colloquium, Springer-Verlag, pp
    • Abdalla M, Catalano D, Dent AW, Malone-Lee J, Neven G, Smart NP (2006) Identity-Based Encryption Gone Wild. Automata, Languages and Programming: 33rd International Colloquium, LNCS 4052, Springer-Verlag, pp. 300-311
    • (2006) LNCS , vol.4052 , pp. 300-311
    • Abdalla, M.1    Catalano, D.2    Dent, A.W.3    Malone-Lee, J.4    Neven, G.5    Smart, N.P.6
  • 16
    • 36348940800 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group (2006) http://www.trustedcomputinggroup.org
    • (2006)
  • 17
    • 36348983635 scopus 로고    scopus 로고
    • Trusted Computing Group (2006) Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, Version 1.2, Revision 94. http://www.trustedcomputinggroup.org
    • Trusted Computing Group (2006) Trusted Platform Module Main Specification, Part 1: Design Principles, Part 2: TPM Structures, Part 3: Commands, Version 1.2, Revision 94. http://www.trustedcomputinggroup.org
  • 18
    • 85084162270 scopus 로고    scopus 로고
    • Design and Implementation of a TCG-Based Integrity Measurement Architecture
    • USENIX, pp
    • Sailer R, Zhang X, Jaeger T, van Doorn L (2004), Design and Implementation of a TCG-Based Integrity Measurement Architecture. 13th Usenix Security Symposium, USENIX, pp. 223-238
    • (2004) 13th Usenix Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.