메뉴 건너뛰기




Volumn , Issue , 2008, Pages 105-110

Aggregating symmetric/asymmetric attestations

Author keywords

[No Author keywords available]

Indexed keywords

CHLORINE COMPOUNDS; ENERGY POLICY; ENERGY UTILIZATION;

EID: 49049106209     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/RFID.2008.4519379     Document Type: Conference Paper
Times cited : (4)

References (15)
  • 1
    • 49049105125 scopus 로고    scopus 로고
    • M.Bellare, R.Canetti and H.Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1.996: 1-15.
    • M.Bellare, R.Canetti and H.Krawczyk: Keying Hash Functions for Message Authentication. CRYPTO 1.996: 1-15.
  • 2
    • 0027726717 scopus 로고    scopus 로고
    • M.Bellare and P.Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In D. Denning, R.Pyle, R.Ganesan, R.Sandhu, and V.Ashby, editors, Proceedings of CCS 1993, pages 62-73. ACM Press, 1993.
    • M.Bellare and P.Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In D. Denning, R.Pyle, R.Ganesan, R.Sandhu, and V.Ashby, editors, Proceedings of CCS 1993, pages 62-73. ACM Press, 1993.
  • 4
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • S.Goldwasser, S.Micali, R.Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2): 281-308 (1988).
    • (1988) SIAM J. Comput , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 6
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating Pervasive Devices with Human Protocols
    • A.Juels, S.Weis: Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005: 293-308
    • (2005) CRYPTO , pp. 293-308
    • Juels, A.1    Weis, S.2
  • 7
    • 34547687590 scopus 로고    scopus 로고
    • Defining Strong Privacy for RFID
    • A.Juels, S.Weis: Defining Strong Privacy for RFID. PerCom Workshops 2007: 342-347
    • (2007) PerCom Workshops , pp. 342-347
    • Juels, A.1    Weis, S.2
  • 12
    • 0017930809 scopus 로고    scopus 로고
    • R.Rivest, A.Shamir, and L.M.Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2): 120-126 (1978).
    • R.Rivest, A.Shamir, and L.M.Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2): 120-126 (1978).
  • 14
    • 33646749910 scopus 로고    scopus 로고
    • H.Zhu, F.Bao, Robert H.Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219.
    • H.Zhu, F.Bao, Robert H.Deng: Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ICICS 2005: 207-219.
  • 15
    • 84881170509 scopus 로고    scopus 로고
    • H.Zhu and J.Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks. ICICS 2006: 72-81
    • H.Zhu and J.Zhou: Finding Compact Reliable Broadcast in Unknown Fixed-Identity Networks. ICICS 2006: 72-81


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.