-
1
-
-
0242585280
-
Im-proving the efficiency and reliability of digital time-stamping
-
D. Bayer, S. Haber, and W. Scott Stornetta, "Im-proving the efficiency and reliability of digital time-stamping," in Sequences'91: Methods in Communi-cation, Security, and Computer Science, pp. 329-334, 1992.
-
(1992)
Sequences'91: Methods in Communi-cation, Security, and Computer Science
, pp. 329-334
-
-
Bayer, D.1
Haber, S.2
Stornetta, W.S.3
-
2
-
-
0141873837
-
-
Technical Report 1, Clarkson Uni-versity Department of Mathematics and Computer Science
-
J. Benaloh and M. de Mare, Efficient Broadcast Time-stamping, Technical Report 1, Clarkson Uni-versity Department of Mathematics and Computer Science, 1991.
-
(1991)
Efficient Broadcast Time-stamping
-
-
Benaloh, J.1
de Mare, M.2
-
4
-
-
84956984263
-
Time-stamping with binary linking schemes
-
A. Buldas, P. Laud, H. Lipmaa, and J. Villemson, "Time-stamping with binary linking schemes," in CRYPTO'98, LNCS 1462, pp. 486-501, 1998.
-
(1998)
CRYPTO'98, LNCS 1462
, pp. 486-501
-
-
Buldas, A.1
Laud, P.2
Lipmaa, H.3
Villemson, J.4
-
6
-
-
0141518230
-
A se-cure nonrepudiable threshold proxy signature scheme with known signers
-
M. S. Hwang, I. C. Lin, and Eric J. L. Lu, "A se-cure nonrepudiable threshold proxy signature scheme with known signers," International Journal of Infor-matica, vol. 11, no. 2, pp. 1-8, 2000.
-
(2000)
International Journal of Infor-matica
, vol.11
, Issue.2
, pp. 1-8
-
-
Hwang, M.S.1
Lin, I.C.2
Lu, E.J.L.3
-
7
-
-
33748435812
-
-
Computer Security Institue, Tech. Rep., Com-puter Security Institue, 2002
-
Computer Security Institue, 2002 CSI/FBI Com-puter Crime and Security Survey, Tech. Rep., Com-puter Security Institue, 2002.
-
(2002)
CSI/FBI Com-puter Crime and Security Survey
-
-
-
8
-
-
0010567510
-
Proxy signatures, revisited
-
S. Kim, S. Park, and D. Won, "Proxy signatures, revisited," in Proceedings of International Confer-ence on Information and Communications Security, LNCS 1334, pp. 223-232, 1997.
-
(1997)
Proceedings of International Confer-ence on Information and Communications Security, LNCS 1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
9
-
-
1642614187
-
Strong proxy signa-ture and its applications
-
B. Lee, H. Kim, and K. Kim, "Strong proxy signa-ture and its applications," in Proceedings of the 2001 Symposium on Cryptography and Information Secu-rity (SCIS 2001), pp. 603-608, 2001.
-
(2001)
Proceedings of the 2001 Symposium on Cryptography and Information Secu-rity (SCIS 2001)
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
10
-
-
84874908325
-
Cryptanalysis of a time-stamped proxy signature scheme
-
Eric J. L. Lu and C. J. Huang, "Cryptanalysis of a time-stamped proxy signature scheme," Inter-national Journal of Computational and Numerical Analysis and Applications, vol. 5, no. 2, pp. 106-115, 2004.
-
(2004)
Inter-national Journal of Computational and Numerical Analysis and Applications
, vol.5
, Issue.2
, pp. 106-115
-
-
Lu, E.J.L.1
Huang, C.J.2
-
11
-
-
10644282065
-
A new proxy signature scheme with revocation
-
Eric J. L. Lu, M. S. Hwang, and C. J. Huang, "A new proxy signature scheme with revocation," Ap-plied Mathematics and Computation, vol. 161, no. 3, pp. 799-806, 2005.
-
(2005)
Ap-plied Mathematics and Computation
, vol.161
, Issue.3
, pp. 799-806
-
-
Lu, E.J.L.1
Hwang, M.S.2
Huang, C.J.3
-
12
-
-
0030231965
-
Proxy sig-natures: Delegation of the power to sign messages
-
Sep
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy sig-natures: Delegation of the power to sign messages," IEICE Transactions on Fundamentals, vol. E79-A, pp. 1338-1354, Sep. 1996.
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
15
-
-
85030460443
-
A threshold cryptosystem with-out a trusted party
-
T. P. Pedersen, "A threshold cryptosystem with-out a trusted party," in Advances in Cryptology, CRYPTO'91, pp. 522-526, 1991.
-
(1991)
Advances in Cryptology, CRYPTO'91
, pp. 522-526
-
-
Pedersen, T.P.1
-
17
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptology, vol. 4, pp. 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, pp. 161-174
-
-
Schnorr, C.P.1
-
18
-
-
0034313266
-
Design of time-stamped proxy signa-tures with traceable receivers
-
H. M. Sun, "Design of time-stamped proxy signa-tures with traceable receivers," IEE Proceedings of Computers and Digital Techniques, vol. 147, no. 6, pp. 462-466, 2000.
-
(2000)
IEE Proceedings of Computers and Digital Techniques
, vol.147
, Issue.6
, pp. 462-466
-
-
Sun, H.M.1
-
19
-
-
0026156775
-
An analy-sis of the proxy problem in distributed systems
-
V. Varadharajan, P. Allen, and S. Black, "An analy-sis of the proxy problem in distributed systems," in Proceedings of 1991 IEEE Computer Society Sympo-sium on Research in Security and Privacy, pp. 255-275, 1991.
-
(1991)
Proceedings of 1991 IEEE Computer Society Sympo-sium on Research in Security and Privacy
, pp. 255-275
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
|