-
2
-
-
3042688872
-
Secret computation with secrets for mobile agent using one-time proxy signature
-
Jan. 23-26
-
H. Kim, J. Baek, B. Lee, and K. Kim, "Secret computation with secrets for mobile agent using one-time proxy signature," In Cryptography and Information Security 2001 (SCIS' 2001), pp.845-850, Jan. 23-26, 2001.
-
(2001)
Cryptography and Information Security 2001 (SCIS' 2001)
, pp. 845-850
-
-
Kim, H.1
Baek, J.2
Lee, B.3
Kim, K.4
-
3
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communication
-
Proc. of ICICS 2001, International Conference on Information and Communications Security, Springer-Verlag
-
H.U. Park and I.Y. Lee, "A digital nominative proxy signature scheme for mobile communication," Proc. of ICICS 2001, International Conference on Information and Communications Security, Springer-Verlag, Lecture Notes in Computer Science 2229, pp.451-455, 2001.
-
(2001)
Lecture Notes in Computer Science 2229
, pp. 451-455
-
-
Park, H.U.1
Lee, I.Y.2
-
4
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudisk, and S. Tuecke, "A security architecture for computational grids," In Fifth ACM Conference on Computers and Communications Security, 1998.
-
Fifth ACM Conference on Computers and Communications Security, 1998
-
-
Foster, I.1
Kesselman, C.2
Tsudisk, G.3
Tuecke, S.4
-
5
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation," In Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS), pp. 48-57, 1996.
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communications Security (CCS)
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
6
-
-
7444222166
-
Digital Rights Management for Content Distribution
-
Qiong Liu, Reihaneh Safavi-Naini and Nicholas Paul Sheppard, "Digital Rights Management for Content Distribution," Proceedings of the Australasian Information Security Workshop conference on ACSW frontiers 2003, vol. 21, pp.49-58.
-
Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003
, vol.21
, pp. 49-58
-
-
Liu, Q.1
Safavi-Naini, R.2
Sheppard, N.P.3
-
7
-
-
0242603883
-
Nominative Signatures
-
S.J. Kim, S.J. Park, and D.H. Won, "Nominative Signatures," Proc. ICEIC'95, pp.68-71, 1995.
-
(1995)
Proc. ICEIC'95
, pp. 68-71
-
-
Kim, S.J.1
Park, S.J.2
Won, D.H.3
-
8
-
-
3042517265
-
Zero-knowledge nominative signature
-
S.J. Kim, S.J. Park, and D.H. Won, "Zero-knowledge nominative signature," Proc. of Pragocrypt'96, International Conference on the Theory and Applications of Cryptology, pp.380-392, 1996.
-
(1996)
Proc. of Pragocrypt'96, International Conference on the Theory and Applications of Cryptology
, pp. 380-392
-
-
Kim, S.J.1
Park, S.J.2
Won, D.H.3
-
9
-
-
13844267747
-
A trusted key management scheme for digital rights management
-
Yeonjeong Jeong, Jisong Yoon, and Jaecheol Ryou, "A Trusted Key Management Scheme for Digital Rights Management," ETRI Journal, Vol.27, No.1, Feb. 2005, pp.114-117. (Pubitemid 40245308)
-
(2005)
ETRI Journal
, vol.27
, Issue.1
, pp. 114-117
-
-
Jeong, Y.1
Yoon, K.2
Ryou, J.3
|