-
5
-
-
84948957152
-
Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements
-
Advances in Cryptology - Eurocrypt, Springer-Verlag
-
M. Bellare, A. Boldyreva, and S. Micali. Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In Advances in Cryptology - Eurocrypt, pages 259 - 274. Springer-Verlag, 2000. Lecture Notes in Computer Science Volume 1807.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
6
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Advances in Cryptology - Crypto 96, Springer-Verlag
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying Hash Functions for Message Authentication. In Advances in Cryptology - Crypto 96, pages 1-15. Springer-Verlag, 1996. Lecture Notes in Computer Science Volume 1109.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
84954417747
-
XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions
-
16th Annual International Cryptology Conference on Advances in Cryptology, Springer-Verlag
-
M. Bellare, R. Guerin, and H. Krawczyk. XOR MACs: New Methods For Message Authentication Using Finite Pseudorandom Functions. In 16th Annual International Cryptology Conference on Advances in Cryptology, pages 15-28. Springer-Verlag, 1995. Lecture Notes in Computer Science Volume 963.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Krawczyk, H.3
-
8
-
-
0001940580
-
Provably Secure Session Key Distribution: The Three Party Case
-
ACM Press
-
M. Bellare and Phillip Rogaway. Provably Secure Session Key Distribution: The Three Party Case. In 27th ACM Symposium on the Theory of Computing, pages 57-66. ACM Press, 1995.
-
(1995)
27th ACM Symposium on the Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
84982993891
-
Abstractions for Mobile Computation
-
Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Springer Verlag
-
L. Cardelli. Abstractions for Mobile Computation. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603, pages 51-79. Springer Verlag, 1999.
-
(1999)
LNCS
, vol.1603
, pp. 51-79
-
-
Cardelli, L.1
-
10
-
-
0019532104
-
Untraceable Electronic Mail, Return addresses and digital Pseudonyms
-
D. Chaum. Untraceable Electronic Mail, Return addresses and digital Pseudonyms. In Communications of the ACM, volume 24, pages 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
11
-
-
0022145479
-
Security Without Identification: Transaction Systems to Make Big Brother Obsolete
-
D. Chaum. Security Without Identification: Transaction Systems to Make Big Brother Obsolete. In Communications of the ACM, volume 28, pages 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
13
-
-
1842616017
-
Design and Analysis of Practical Public-Key Encryption Schemes Secure Against Adaptive Chosen Ciphertext Attack
-
R. Cramer and V. Shoup. Design and Analysis of Practical Public-Key Encryption Schemes Secure Against Adaptive Chosen Ciphertext Attack. SIAM Journal on Computing, 33(1):167-226, 2003.
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
15
-
-
0003593599
-
SPKI Certificate Theory
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. In RFC 2693, Internet Engineering Task Force, 1999.
-
(1999)
RFC 2693, Internet Engineering Task Force
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
16
-
-
0037697335
-
Anonymity and Accountability in Self-organising Electronic Communities
-
C. Farkas, G. Ziegler, A. Meretei, and A. Lorincz. Anonymity and Accountability in Self-organising Electronic Communities. In Proceedings of ACM Workshop on Privacy in Electronic Society, pages 81-90, 2002.
-
(2002)
Proceedings of ACM Workshop on Privacy in Electronic Society
, pp. 81-90
-
-
Farkas, C.1
Ziegler, G.2
Meretei, A.3
Lorincz, A.4
-
18
-
-
0002819636
-
Trust Online
-
B. Friedman, P.H. Khan, and D.C. Howe. Trust Online. In Communications of the ACM, volume 43, pages 34-40, 2000.
-
(2000)
Communications of the ACM
, vol.43
, pp. 34-40
-
-
Friedman, B.1
Khan, P.H.2
Howe, D.C.3
-
20
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM Journal on Computing, 17(2):281-308, 1988.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
21
-
-
0041540817
-
Building Consumer Trust Online
-
D.L. Hoffman, T.P. Novak, and T. Peralta. Building Consumer Trust Online. In Communications of the ACM, volume 42, pages 80-85, 1999.
-
(1999)
Communications of the ACM
, vol.42
, pp. 80-85
-
-
Hoffman, D.L.1
Novak, T.P.2
Peralta, T.3
-
22
-
-
84957805078
-
Platform for Enterprise Privacy Practices - Privacy-enabled Management of Customer Data
-
Proceedings of the Privacy Enhancing Technologies Conference, volume
-
G. Karjoth, M. Schunter, and M. Waidner. Platform for Enterprise Privacy Practices - Privacy-enabled Management of Customer Data. In Proceedings of the Privacy Enhancing Technologies Conference, volume LNCS 2482, pages 69-84, 2003.
-
(2003)
LNCS
, vol.2482
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
23
-
-
84937564790
-
Anonymity, Unobservability and Pseudonymity - A proposal for Terminology
-
Proceedings of the workshop on Design issues in anonymity and unobservability, Springer-Verlag
-
A. Pfitzmann and M. Kohntopp. Anonymity, Unobservability and Pseudonymity - A proposal for Terminology. In Proceedings of the workshop on Design issues in anonymity and unobservability, LNCS 2009, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.2009
-
-
Pfitzmann, A.1
Kohntopp, M.2
-
24
-
-
0032074579
-
Anonymous Connections and Onion Routing
-
M.G. Reed, P. F. Syverson, and D. Goldschlag. Anonymous Connections and Onion Routing. In IEEE Journal on Selected Areas in Communications, volume 16, pages 482-494, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.3
|