메뉴 건너뛰기




Volumn , Issue , 2006, Pages 439-448

PAST: Probabilistic Authentication of Sensor Timestamps

Author keywords

[No Author keywords available]

Indexed keywords

FORWARD-SECURE PROTOCOL; PROBABILISTIC AUTHENTICATION; STORAGE COSTS;

EID: 39049162016     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2006.37     Document Type: Conference Paper
Times cited : (5)

References (16)
  • 1
    • 39049089059 scopus 로고    scopus 로고
    • http://www.ibm.com/security/cryptocards/
  • 2
    • 79958074367 scopus 로고    scopus 로고
    • Mihir Bellare and Sarah Miner, A Forward-Secure Digital Signature Scheme, Advances in Cryptology, Lecture Notes in Computer Science 1666, 1999.
    • Mihir Bellare and Sarah Miner, A Forward-Secure Digital Signature Scheme, Advances in Cryptology, Lecture Notes in Computer Science 1666, 1999.
  • 3
    • 39049132102 scopus 로고    scopus 로고
    • http://www.intrinsyc.com/products/cerfcube/
  • 4
    • 39049170751 scopus 로고    scopus 로고
    • http://www.cyberflex.com
  • 8
    • 84937422774 scopus 로고    scopus 로고
    • Signer-Base Intrusion-Resilient Signatures, Advances in Cryptology
    • SiBIR
    • Gene Itkis and Leonid Reyzin, SiBIR: Signer-Base Intrusion-Resilient Signatures, Advances in Cryptology, Lecture Notes in Computer Science 2442, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442
    • Itkis, G.1    Reyzin, L.2
  • 11
    • 39049142910 scopus 로고    scopus 로고
    • David Malan, Crypto for Tiny Objects, Harvard University Technical Report TR-04-04, 2004.
    • David Malan, Crypto for Tiny Objects, Harvard University Technical Report TR-04-04, 2004.
  • 14
    • 39049129323 scopus 로고
    • Digital signatures and public-key functions as intractable as factorization, TR-212
    • Michael Rabin, Digital signatures and public-key functions as intractable as factorization, MIT Technical Report TR-212, 1979.
    • (1979) MIT Technical Report
    • Rabin, M.1
  • 15
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes, Advances in Cryptology
    • A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology, Lecture Notes in Computer Science 196, 1984.
    • (1984) Lecture Notes in Computer Science , vol.196
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.