-
2
-
-
33846235192
-
-
ARINGHIEEI, R., DAMIANI, E., DE CAPITANI dI VIMERCATI, S., AND SAMAEATI, P. 2005. Assessing efficiency of trust management in peer-to-peer systems. In Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS'05).
-
ARINGHIEEI, R., DAMIANI, E., DE CAPITANI dI VIMERCATI, S., AND SAMAEATI, P. 2005. Assessing efficiency of trust management in peer-to-peer systems. In Proceedings of the 1st International Workshop on Collaborative Peer-to-Peer Information Systems (COPS'05).
-
-
-
-
3
-
-
84921018856
-
-
ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of the Annual International Cryptology Conference (CRYPTO'00). Lecture Notes in Computer Science, 1880. Springer Verlag, 255-270.
-
ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of the Annual International Cryptology Conference (CRYPTO'00). Lecture Notes in Computer Science, vol. 1880. Springer Verlag, 255-270.
-
-
-
-
4
-
-
84982994153
-
Distributed access-rights management with delegation certificates
-
Secure Internet Programming-Security Issues for Distributed and Mobile Objects, Springer
-
AUEA, T. 1999. Distributed access-rights management with delegation certificates. In Secure Internet Programming-Security Issues for Distributed and Mobile Objects. Lecture Notes in Computer Science, vol. 1603. Springer, 211-235.
-
(1999)
Lecture Notes in Computer Science
, vol.1603
, pp. 211-235
-
-
AUEA, T.1
-
5
-
-
84954406641
-
-
BALFANZ, D., DURFEE, G., SHANKAR, N., SMETTERS, D., STADDON, J., AND WONG, H. 2003. Secret handshakes from pairing-based key agreements. In Proceedings of the IEEE Symposium on Security and Privacy (SP'03). IEEE Press. 180-196.
-
BALFANZ, D., DURFEE, G., SHANKAR, N., SMETTERS, D., STADDON, J., AND WONG, H. 2003. Secret handshakes from pairing-based key agreements. In Proceedings of the IEEE Symposium on Security and Privacy (SP'03). IEEE Press. 180-196.
-
-
-
-
6
-
-
84937428623
-
-
BAEEETO, P. S., KIM, H. Y., LYNN, B., AND SCOTT, M. 2002. Efficient algorithms for pairingbased cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, 2442. Springer-Verlag, 354-368.
-
BAEEETO, P. S., KIM, H. Y., LYNN, B., AND SCOTT, M. 2002. Efficient algorithms for pairingbased cryptosystems. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, vol. 2442. Springer-Verlag, 354-368.
-
-
-
-
7
-
-
35248843604
-
-
BELLAEE, M., MICCIANCIO, D., AND WARINSCHI, B. 2003. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). Lecture Notes in Computer Science, 2656. 614-629.
-
BELLAEE, M., MICCIANCIO, D., AND WARINSCHI, B. 2003. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). Lecture Notes in Computer Science, vol. 2656. 614-629.
-
-
-
-
10
-
-
60349125449
-
-
BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Proceedings of the Annual International Cryptology Conference (CRYPTO'04). Lecture Notes in Computer Science.
-
BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Proceedings of the Annual International Cryptology Conference (CRYPTO'04). Lecture Notes in Computer Science.
-
-
-
-
11
-
-
84874324906
-
-
BONEH, D. AND FRANKLIN, M. 2001a. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, 2139. Springer, 213-229.
-
BONEH, D. AND FRANKLIN, M. 2001a. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, vol. 2139. Springer, 213-229.
-
-
-
-
12
-
-
84874324906
-
-
BONEH, D. AND FRANKLIN, M. K. 2001b. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, 2139. Springer, 213-229.
-
BONEH, D. AND FRANKLIN, M. K. 2001b. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference (CRYPTO'01). Lecture Notes in Computer Science, vol. 2139. Springer, 213-229.
-
-
-
-
13
-
-
35248835575
-
-
BONEH, D., GENTEY, C., LYNN, B., AND SHACHAM, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). 416-432.
-
BONEH, D., GENTEY, C., LYNN, B., AND SHACHAM, H. 2003. Aggregate and verifiably encrypted signatures from bilinear maps. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'03). 416-432.
-
-
-
-
15
-
-
84946840347
-
Short signatures from the Weil pairing
-
Advances in Cryptology ASIACRYPT'01, Springer-Verlag
-
BONEH, D., LYNN, B., AND SHACHAM, H. 2001. Short signatures from the Weil pairing. In Advances in Cryptology (ASIACRYPT'01). Lecture Notes in Computer Science, vol. 2248. Springer-Verlag, 514-523.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-523
-
-
BONEH, D.1
LYNN, B.2
SHACHAM, H.3
-
17
-
-
84945135810
-
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'01), B. Pfitzmann, ed. Lecture Notes in Computer Science, 2045. Springer Verlag, 93-118.
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT'01), B. Pfitzmann, ed. Lecture Notes in Computer Science, vol. 2045. Springer Verlag, 93-118.
-
-
-
-
18
-
-
84937428748
-
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, 2442. 61-76.
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of the Annual International Cryptology Conference (CRYPTO'02). Lecture Notes in Computer Science, vol. 2442. 61-76.
-
-
-
-
20
-
-
84958612917
-
-
CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Proceedings of the Annual International Cryptology Conference (CRYPTO'97). Lecture Notes in Computer Science, 1296. Springer-Verlag, 410-424.
-
CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Proceedings of the Annual International Cryptology Conference (CRYPTO'97). Lecture Notes in Computer Science, vol. 1296. Springer-Verlag, 410-424.
-
-
-
-
21
-
-
0038687775
-
-
CAMENISCH, J. AND VAN HERREWEGHEN, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). 21-30.
-
CAMENISCH, J. AND VAN HERREWEGHEN, E. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). 21-30.
-
-
-
-
22
-
-
33749578123
-
-
CHASE, M. AND LYSYANSKAYA, A. 2006. On signatures of knowledge. In Proceedings of the Annual International Cryptology Conference (CRYPTO'06). Lecture Notes in Computer Science, 4117. Springer, 78-96.
-
CHASE, M. AND LYSYANSKAYA, A. 2006. On signatures of knowledge. In Proceedings of the Annual International Cryptology Conference (CRYPTO'06). Lecture Notes in Computer Science, vol. 4117. Springer, 78-96.
-
-
-
-
23
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
CHAUM, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Comm. ACM 28, 10, 1030-1044.
-
(1985)
Comm. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
CHAUM, D.1
-
26
-
-
60349130018
-
-
CHEN, X., ZHANG, F., AND KIM, K. 2003. A new ID-based group signature scheme from bilinear pairings. In Proceedings of the International Workshop on Information Security Applications (WISA'03). K. Chae and M. Yung eds. Lecture Notes in Computer Science, 2908. Springer, 585-592.
-
CHEN, X., ZHANG, F., AND KIM, K. 2003. A new ID-based group signature scheme from bilinear pairings. In Proceedings of the International Workshop on Information Security Applications (WISA'03). K. Chae and M. Yung eds. Lecture Notes in Computer Science, vol. 2908. Springer, 585-592.
-
-
-
-
27
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
CLARKE, D., ELIEN, J.-E., ELLISON, C, FREDETTE, M., MORCOS, A., AND RIVEST, R. L. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9, 4, 285-322.
-
(2001)
J. Comput. Secur
, vol.9
, Issue.4
, pp. 285-322
-
-
CLARKE, D.1
ELIEN, J.-E.2
ELLISON, C.3
FREDETTE, M.4
MORCOS, A.5
RIVEST, R.L.6
-
31
-
-
38349082709
-
Trust negotiation with hidden credentials, hidden policies, and policy cycles
-
FRIKKEN, K. B., LI, J., AND ATALLAH, M. J. 2006. Trust negotiation with hidden credentials, hidden policies, and policy cycles. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06).
-
(2006)
Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06
-
-
FRIKKEN, K.B.1
LI, J.2
ATALLAH, M.J.3
-
32
-
-
21144440101
-
-
GOODEICH, M. T., SHIN, M., TAMASSIA, R., AND WINSBOEOUGH, W. H. 2003. Authenticated dictionaries for fresh attribute credentials. In Proceedings of the Trust Management Conference (TRUST03). Lecture Notes in Computer Science, 2692. Springer, 332-347.
-
GOODEICH, M. T., SHIN, M., TAMASSIA, R., AND WINSBOEOUGH, W. H. 2003. Authenticated dictionaries for fresh attribute credentials. In Proceedings of the Trust Management Conference (TRUST03). Lecture Notes in Computer Science, vol. 2692. Springer, 332-347.
-
-
-
-
33
-
-
1642394295
-
Hidden credentials
-
HOLT, J. E., BRADSHAW, R. W., SEAMONS, K. E., AND ORMAN, H. 2003. Hidden credentials. In Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society (WPES'03).
-
(2003)
Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society (WPES'03
-
-
HOLT, J.E.1
BRADSHAW, R.W.2
SEAMONS, K.E.3
ORMAN, H.4
-
34
-
-
60349093086
-
-
JUELS, A. 1999. Trustee tokens: Simple and practical tracing of anonymous digital cash. In Proceedings of the 3rd International Conference on Financial Cryptography (FC'99). Lecture Notes in Computer Science, 1648. Springer-Verlag, 33-43.
-
JUELS, A. 1999. Trustee tokens: Simple and practical tracing of anonymous digital cash. In Proceedings of the 3rd International Conference on Financial Cryptography (FC'99). Lecture Notes in Computer Science, vol. 1648. Springer-Verlag, 33-43.
-
-
-
-
35
-
-
0041524661
-
Delegation Logic: A logic-based approach to distributed authorization
-
LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation Logic: A logic-based approach to distributed authorization. ACM Trans. Inform. Syst. Secur. 6, 1, 128-171.
-
(2003)
ACM Trans. Inform. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
LI, N.1
GROSOF, B.N.2
FEIGENBAUM, J.3
-
37
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 1, 35-86.
-
(2003)
J. Comput. Secur
, vol.11
, Issue.1
, pp. 35-86
-
-
LI, N.1
WINSBOROUGH, W.H.2
MITCHELL, J.C.3
-
38
-
-
35048877778
-
-
LYSYANSKAYA, A., MICALI, S., REYZIN, L., AND SHACHAM, H. 2004. Sequential aggregate signatures from trapdoor permutations. In Proceedings of Advances in Cryptology (EUROCRYPT'04). Lecture Notes in Computer Science, 3027. Springer-Verlag, 74-90.
-
LYSYANSKAYA, A., MICALI, S., REYZIN, L., AND SHACHAM, H. 2004. Sequential aggregate signatures from trapdoor permutations. In Proceedings of Advances in Cryptology (EUROCRYPT'04). Lecture Notes in Computer Science, vol. 3027. Springer-Verlag, 74-90.
-
-
-
-
40
-
-
84937389342
-
-
OKAMOTO, T. AND POINTCHEVAL, D. 2001. The gap-problems: A new class of problems for the security of cryptographic schemes. In Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC'01). Lecture Notes in Computer Science, 1992. Springer-Verlag, 104-118.
-
OKAMOTO, T. AND POINTCHEVAL, D. 2001. The gap-problems: A new class of problems for the security of cryptographic schemes. In Proceedings of the International Conference on Theory and Public-Key Cryptography (PKC'01). Lecture Notes in Computer Science, vol. 1992. Springer-Verlag, 104-118.
-
-
-
-
41
-
-
33751100921
-
-
PALLICKAEA, S. L., PLALE, B., FANG, L., AND GANNON, D. 2006. End-to-end trustworthy data access in data-oriented scientific computing. In Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'06). 395-400.
-
PALLICKAEA, S. L., PLALE, B., FANG, L., AND GANNON, D. 2006. End-to-end trustworthy data access in data-oriented scientific computing. In Proceedings of the 6th IEEE International Symposium on Cluster Computing and the Grid (CCGrid'06). 395-400.
-
-
-
-
42
-
-
0027699087
-
Lattice-based access control models
-
SANDHU, R. S. 1993. Lattice-based access control models. IEEE Comput. 26, 11, 9-19.
-
(1993)
IEEE Comput
, vol.26
, Issue.11
, pp. 9-19
-
-
SANDHU, R.S.1
-
43
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
SANDHU, R.S.1
COYNE, E.J.2
FEINSTEIN, H.L.3
YOUMAN, C.E.4
-
44
-
-
85020598353
-
-
SHAMIR, A. 1984. Identity-based cryptosystems and signature schemes. In Proceedings of the Annual International Cryptology Conference (CRYPTO'84). Lecture Notes in Computer Science, 196. Springer, 47-53.
-
SHAMIR, A. 1984. Identity-based cryptosystems and signature schemes. In Proceedings of the Annual International Cryptology Conference (CRYPTO'84). Lecture Notes in Computer Science, vol. 196. Springer, 47-53.
-
-
-
-
45
-
-
4143059136
-
Role-based cascaded delegation
-
ACM Press
-
TAMASSIA, R., YAO, D., AND WINSBOROUGH, W. H. 2004. Role-based cascaded delegation. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT'04). ACM Press, 146-155.
-
(2004)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT'04
, pp. 146-155
-
-
TAMASSIA, R.1
YAO, D.2
WINSBOROUGH, W.H.3
-
48
-
-
14844297376
-
-
YAO, D., FAZIO, N., DODIS, Y., AND LYSYANSKAYA, A. 2004. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'04). ACM Press, 354-363.
-
YAO, D., FAZIO, N., DODIS, Y., AND LYSYANSKAYA, A. 2004. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'04). ACM Press, 354-363.
-
-
-
-
50
-
-
33845964139
-
-
YAO, D., TAMASSIA, R., AND PROCTOR, S. 2005. On improving the performance of role-based cascaded delegation in ubiquitous computing. In Proceedings of the IEEE / Create Net Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05). IEEE Press, 157-168.
-
YAO, D., TAMASSIA, R., AND PROCTOR, S. 2005. On improving the performance of role-based cascaded delegation in ubiquitous computing. In Proceedings of the IEEE / Create Net Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm'05). IEEE Press, 157-168.
-
-
-
-
51
-
-
0034449542
-
-
YU, T., MA, X., AND WINSLETT, M. 2000. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'00). 210-219.
-
YU, T., MA, X., AND WINSLETT, M. 2000. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'00). 210-219.
-
-
-
|