-
1
-
-
70349630415
-
Flexible authentication framework with bound authentication and authorization
-
J. HAJNY, T. PELKA, V. ZEMAN, Flexible authentication framework with bound authentication and authorization, WSEAS TRANSACTIONS on COMMUNICATIONS, Vol.8, No.1, 2009, pp. 143-52.
-
(2009)
Wseas Transactions on Communications
, vol.8
, Issue.1
, pp. 143-52
-
-
Hajný, J.1
Pelka, T.2
Zeman, V.3
-
2
-
-
72849145625
-
The benefits of PKI application and competitive advantage
-
C.I. HSU, The Benefits of PKI Application and Competitive Advantage, WSEAS TRANSACTIONS on COMMUNICATIONS, Vol.7, No.7, 2008, pp. 776-785.
-
(2008)
Wseas Transactions on Communications
, vol.7
, Issue.7
, pp. 776-785
-
-
Hsu, C.I.1
-
3
-
-
72849128658
-
An IPSec-based key management algorithm for mobile IP networks
-
N.C.Wang, J.S. Chen, Y.F. Huang, and T.W. Chan, An IPSec-Based Key Management Algorithm for Mobile IP Networks, WSEAS TRANSACTIONS on COMMUNICATIONS, Vol.7, No.8, 2008, pp. 892-901.
-
(2008)
Wseas Transactions on Communications
, vol.7
, Issue.8
, pp. 892-901
-
-
Wang, N.C.1
Chen, J.S.2
Huang, Y.F.3
Chan, T.W.4
-
4
-
-
59249089453
-
A blind source separation based cryptography scheme for mobile military communication applications
-
N. Doukas, N.V. Karadimas, A blind source separation based cryptography scheme for mobile military communication applications, WSEAS TRANSACTIONS on COMMUNICATIONS, Vol.7, No.12, 2008, pp. 1235-1245.
-
(2008)
Wseas Transactions on Communications
, vol.7
, Issue.12
, pp. 1235-1245
-
-
Doukas, N.1
Karadimas, N.V.2
-
5
-
-
14844325627
-
-
Trusted Computing Group
-
Trusted Computing Group. TCG TPM specification 1.2 (2003), http://www.trustedcomputinggroup.org
-
(2003)
TCG TPM specification 1.2
-
-
-
6
-
-
14844295011
-
Direct anonymous attestation
-
ACM Press, New York
-
E. Brickell, J. Camenisch, L. Chen, Direct anonymous attestation, In: Proceedings of the 11th ACM Conference on Computer and Communications Security, ACM Press, New York, 2004, pp. 132-145.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 132-145
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
7
-
-
38049042811
-
A direct anonymous attestation scheme for embedded devices
-
LNCS 4450
-
H. Ge, S. R. Tate, A Direct Anonymous Attestation Scheme for Embedded Devices, In: Public Key Cryptography, LNCS 4450, 2007, pp.16-30.
-
(2007)
Public Key Cryptography
, pp. 16-30
-
-
Ge, H.1
Tate, S.R.2
-
8
-
-
72849152401
-
Direct anonymous attestation for next generation TPM
-
X. F. Chen, D. G. Feng, Direct Anonymous Attestation for Next Generation TPM, Journal of Computer, Vol. 3, No.12, 2008, pp.43-50.
-
(2008)
Journal of Computer
, vol.3
, Issue.12
, pp. 43-50
-
-
Chen, X.F.1
Feng, D.G.2
-
9
-
-
85024290278
-
Group signatures
-
Springer-Verlag
-
D. Chaum and E.V. Heyst, Group signatures, In: EUROCRYPT'91, LNCS 547, Springer-Verlag, 1991, pp. 257-265.
-
(1991)
Eurocrypt'91, LNCS 547
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
10
-
-
35048887476
-
Short group signature
-
D. Boneh, X. Boyen, and H. Shacham, Short group signature, In proceedings of Crypto '04, LNCS 3152, 2004, pp. 41-55.
-
(2004)
Proceedings of Crypto '04, LNCS 3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
11
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, In: Proceedings of CRYPTO 2000, pp. 255-270.
-
(2000)
Proceedings of CRYPTO
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
14
-
-
84958612917
-
Efficient group signature schemes for large groups
-
LNCS 1296, Springer, Heidelberg
-
J. Camenisch, M. Stadler, Efficient group signature schemes for large groups, In: CAIP 1997. LNCS 1296, Springer, Heidelberg, 1997, pp. 410-424.
-
(1997)
CAIP 1997
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Odlyzko, A.M. (ed.), LNCS 263, Springer, Heidelberg
-
A.Fiat, A.Shamir, How to prove yourself: Practical solutions to identification and signature problems, In: Odlyzko, A.M. (ed.) CRYPTO 1986, LNCS 263, Springer, Heidelberg 1987, pp. 186-194.
-
(1986)
CRYPTO
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
33749578123
-
On signatures of knowledge
-
LNCS 4117, Springer, Heidelber
-
M.Chase, A.Lysyanskaya, On signatures of knowledge, In: Crypto 2006, LNCS 4117, Springer, Heidelber 2006, pp.78-96.
-
(2006)
Crypto 2006
, pp. 78-96
-
-
Chase, M.1
Lysyanskaya, A.2
-
17
-
-
84982943258
-
Non-interactive and information theoretic secure verifiable secret sharing
-
LNCS 576, Springer Verlag
-
T. Pedersen, Non-interactive and information theoretic secure verifiable secret sharing, In: CRYPTO 1991, LNCS 576, Springer Verlag, 1992, pp. 129-140.
-
(1992)
CRYPTO 1991
, pp. 129-140
-
-
Pedersen, T.1
|