-
1
-
-
46449126152
-
Progress on trustable computation
-
ZHANG H G, LUO J, JING G, et al. Progress on trustable computation[J]. Journal of Wuhan University (Natural Science), 2006, 52(5): 513-518.
-
(2006)
Journal of Wuhan University (Natural Science)
, vol.52
, Issue.5
, pp. 513-518
-
-
Zhang, H.G.1
Luo, J.2
Jing, G.3
-
2
-
-
57649105795
-
Trustable computation platform and secure operating systems
-
SHEN C X. Trustable computation platform and secure operating systems[J]. Network Security Technology and Application, 2005, 4: 8-9.
-
(2005)
Network Security Technology and Application
, vol.4
, pp. 8-9
-
-
Shen, C.X.1
-
3
-
-
58249142830
-
Uphold independent and speed up development of trustable computation
-
SHEN C X. Uphold independent and speed up development of trustable computation[J]. Computer Security, 2006, 6: 2-17.
-
(2006)
Computer Security
, vol.6
, pp. 2-17
-
-
Shen, C.X.1
-
5
-
-
85059953548
-
The trusted computing platform alliance, building a foundation of trust in the PC
-
The trusted computing platform alliance, building a foundation of trust in the PC[EB/OL]. http://www.trustedpc.org, 2000.
-
(2000)
-
-
-
9
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
AVIZIENIS A A, LAPRIE J C, RANDELL B, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Transaction on Dependable and Secure Computing, 2004, 1(1): 11-33.
-
(2004)
IEEE Transaction on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.A.1
Laprie, J.C.2
Randell, B.3
-
11
-
-
58249141782
-
Managing trust in medical information systems
-
BLAZE M, FEIGENBAUM J, LACY J. Managing trust in medical information systems[EB/OL]. http://citeseer.nj.nec.com/did/35925, 1996.
-
(1996)
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
14
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
LI N, GROSOF B, FEIGENBAUM J. Delegation logic: a logic-based approach to distributed authorization[J]. ACM Transactions on Information and System Security (TISSEC), 2003, 6(1): 128-171.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
15
-
-
24944516457
-
Analysing topologies of transitive trust
-
FAST, TR-10/2003
-
JØSANG A, GRAY L, KINATEDER M. Analysing Topologies of Transitive Trust[R]. FAST, TR-10/2003, 2003. 9-22.
-
(2003)
, pp. 9-22
-
-
JØsang, A.1
Gray, L.2
Kinateder, M.3
-
17
-
-
84944878224
-
Transitive signature schemes
-
Preneel B.(ed.), Springer-Verlag
-
MICALI S, RIVEST R L. Transitive signature schemes[A]. B Preneel (Ed.): CT-RSA 2002, LNCS 2271[C]. Springer-Verlag, 2002. 236-243.
-
(2002)
CT-RSA 2002, LNCS 2271
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
18
-
-
20544455127
-
Transitive signatures based on factoring and RSA
-
BELLARE M, NEVEN G. Transitive signatures based on factoring and RSA[A]. ASIACRYPT 2002, LNCS 2501[C]. 2005. 2133-2151.
-
(2005)
ASIACRYPT 2002, LNCS 2501
, pp. 2133-2151
-
-
Bellare, M.1
Neven, G.2
-
20
-
-
20544463595
-
A provably secure short transitive signature scheme from bilinear group Pairs
-
SHAHANDASHTI S F, SALMASIZADEH M, MOHAJERI J. A provably secure short transitive signature scheme from bilinear group Pairs[A]. SCN 2004, LNCS 3352[C]. 2005. 60-76.
-
(2005)
SCN 2004, LNCS 3352
, pp. 60-76
-
-
Shahandashti, S.F.1
Salmasizadeh, M.2
Mohajeri, J.3
-
21
-
-
38349062457
-
Transitive signatures from braid
-
WANG L, CAO Z, ZHENG S, et al. Transitive signatures from braid[A]. Groups, Indocrypt 2007, LNCS 4859[C]. 2007. 183-196.
-
(2007)
Groups, Indocrypt 2007, LNCS 4859
, pp. 183-196
-
-
Wang, L.1
Cao, Z.2
Zheng, S.3
-
24
-
-
24744468831
-
Efficient directed transitive signature scheme
-
HUANG Z J, HAO Y H, WANG Y M, et al. Efficient directed transitive signature scheme[J]. Acta Electronica Sinica, 2005, 33(8): 1497-1501.
-
(2005)
Acta Electronica Sinica
, vol.33
, Issue.8
, pp. 1497-1501
-
-
Huang, Z.J.1
Hao, Y.H.2
Wang, Y.M.3
-
25
-
-
84992493441
-
Directed transitive signature scheme
-
YI X. Directed transitive signature scheme[A]. CT-RSA'07, LNCS 4377[C]. 2007. 129-144.
-
(2007)
CT-RSA'07, LNCS 4377
, pp. 129-144
-
-
Yi, X.1
-
26
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg K.(ed.), LNCS
-
BLAZE M, BLEUMER G, STRAUSS M. Divertible protocols and atomic proxy cryptography[A]. Nyberg, K. (ed.) EUROCRYPT 1998. LNCS[C]. 1998. 127-144.
-
(1998)
UROCRYPT 1998
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
27
-
-
33745782314
-
Proxy re-signatures: New definitions, algorithms, and applications
-
ATENIESE G, HOHENBERGER S. Proxy re-signatures: new definitions, algorithms, and applications[A]. ACM CCS 2005[C]. 2005. 310-319.
-
(2005)
ACM CCS 2005
, pp. 310-319
-
-
Ateniese, G.1
Hohenberger, S.2
-
29
-
-
67049120934
-
Proxy re-cryptography revisited
-
Shanghai Jiaotong University
-
SHAO J. Proxy Re-Cryptography Revisited[D]. Shanghai Jiaotong University, 2008.
-
(2008)
-
-
Shao, J.1
-
31
-
-
0020915882
-
Blind signatures for untraceable payments
-
CHAUM D. Blind signatures for untraceable payments[A]. CRYPTO 1982[C]. 1982. 199-203.
-
(1982)
CRYPTO 1982
, pp. 199-203
-
-
Chaum, D.1
-
32
-
-
0018545449
-
How to share a secret
-
SHAMIR A. How to share a secret?[J]. Communication of the ACM, 1979, 22(11): 612-613.
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|