메뉴 건너뛰기




Volumn 60, Issue , 2004, Pages 138-147

A user-centric anonymous authorisation framework in e-commerce environment

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS RIGHTS; ATTRIBUTE CERTIFICATE; BINDING SIGNATURES; CREDENTIAL-BASED APPROACH; E-COMMERCE; IDENTITY-BASED; OPEN ENVIRONMENT; SERVICE PROVIDER; THIRD PARTIES; TRUST ESTABLISHMENT; USER PRIVACY; USER-CENTRIC;

EID: 77954474147     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1052220.1052238     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 5
    • 84948957152 scopus 로고    scopus 로고
    • Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements
    • Advances in Cryptology - Eurocrypt, Springer-Verlag
    • M. Bellare, A. Boldyreva, and S. Micali. Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In Advances in Cryptology - Eurocrypt, pages 259 - 274. Springer-Verlag, 2000. Lecture Notes in Computer Science Volume 1807.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 259-274
    • Bellare, M.1    Boldyreva, A.2    Micali, S.3
  • 6
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Advances in Cryptology - Crypto 96, Springer-Verlag
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. In Advances in Cryptology - Crypto 96, pages 1-15. Springer-Verlag, 1996. Lecture Notes in Computer Science Volume 1109.
    • (1996) Lecture Notes in Computer Science , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 7
    • 84954417747 scopus 로고
    • XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
    • 16th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag
    • M. Bellare, R. Guerin, and H. Krawczyk. XOR MACs: New Methods For Message Authentication Using Finite Pseudorandom Functions. In 16th Annual International Cryptology Conference on Advances in Cryptology, pages 15-28. Springer-Verlag, 1995. Lecture Notes in Computer Science Volume 963.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 15-28
    • Bellare, M.1    Guerin, R.2    Krawczyk, H.3
  • 8
    • 0001940580 scopus 로고
    • Provably Secure Session Key Distribution: The Three Party Case
    • ACM Press
    • M. Bellare and Phillip Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In 27th ACM Symposium on the Theory of Computing, pages 57-66. ACM Press, 1995.
    • (1995) 27th ACM Symposium on the Theory of Computing , pp. 57-66
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 84982993891 scopus 로고    scopus 로고
    • Abstractions for Mobile Computation
    • Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer Verlag
    • L. Cardelli. Abstractions for Mobile Computation. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, pages 51-79. Springer Verlag, 1999.
    • (1999) LNCS , vol.1603 , pp. 51-79
    • Cardelli, L.1
  • 10
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return addresses and digital Pseudonyms
    • D. Chaum. Untraceable Electronic Mail, Return addresses and digital Pseudonyms. In Communications of the ACM, volume 24, pages 84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 84-88
    • Chaum, D.1
  • 11
    • 0022145479 scopus 로고
    • Security Without Identification: Transaction Systems to Make Big Brother Obsolete
    • D. Chaum. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. In Communications of the ACM, volume 28, pages 1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , pp. 1030-1044
    • Chaum, D.1
  • 13
    • 1842616017 scopus 로고    scopus 로고
    • Design and Analysis of Practical Public-Key Encryption Schemes Secure Against Adaptive Chosen Ciphertext Attack
    • R. Cramer and V. Shoup. Design and Analysis of Practical Public-Key Encryption Schemes Secure Against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing, 33(1):167-226, 2003.
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 20
    • 0023985465 scopus 로고
    • A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
    • S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.L.3
  • 22
    • 84957805078 scopus 로고    scopus 로고
    • Platform for Enterprise Privacy Practices - Privacy-enabled Management of Customer Data
    • Proceedings of the Privacy Enhancing Technologies Conference, volume
    • G. Karjoth, M. Schunter, and M. Waidner. Platform for Enterprise Privacy Practices - Privacy-enabled Management of Customer Data. In Proceedings of the Privacy Enhancing Technologies Conference, volume LNCS 2482, pages 69-84, 2003.
    • (2003) LNCS , vol.2482 , pp. 69-84
    • Karjoth, G.1    Schunter, M.2    Waidner, M.3
  • 23
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, Unobservability and Pseudonymity - A proposal for Terminology
    • Proceedings of the workshop on Design issues in anonymity and unobservability, Springer-Verlag
    • A. Pfitzmann and M. Kohntopp. Anonymity, Unobservability and Pseudonymity - A proposal for Terminology. In Proceedings of the workshop on Design issues in anonymity and unobservability, LNCS 2009, Springer-Verlag, 2000.
    • (2000) LNCS , vol.2009
    • Pfitzmann, A.1    Kohntopp, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.