메뉴 건너뛰기




Volumn 6052 LNCS, Issue , 2010, Pages 222-237

The phish-market protocol: Securely sharing attack data between competitors

Author keywords

[No Author keywords available]

Indexed keywords

DOMAIN NAMES; PHISHING; SENSITIVE INFORMATIONS;

EID: 77955326757     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14577-3_18     Document Type: Conference Paper
Times cited : (6)

References (15)
  • 1
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • ACM Press, New York
    • Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols. In: STOC 1990, pp. 503-513. ACM Press, New York (1990)
    • (1990) STOC 1990 , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 2
    • 85032877753 scopus 로고
    • Non-interactive oblivious transfer and applications
    • Brassard, G. (ed.), Springer, Heidelberg, CRYPTO 1989
    • Bellare, M., Micali, S.: Non-interactive oblivious transfer and applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.435, pp. 547-557. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 3
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computations
    • ACM Press, New York
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computations. In: STOC 1988, pp. 1-10. ACM Press, New York (1988)
    • (1988) STOC 1988 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 4
    • 85001025766 scopus 로고
    • Wallet databases with observers
    • Brickell, E.F. (ed.), Springer, Heidelberg, CRYPTO 1992
    • Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 89-105. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 89-105
    • Chaum, D.1    Pedersen, T.P.2
  • 5
    • 30344462995 scopus 로고    scopus 로고
    • The economic incentives for sharing security information
    • Gal-Or, E., Ghose, A.: The economic incentives for sharing security information. Information Systems Research 16(2), 186-208 (2005)
    • (2005) Information Systems Research , vol.16 , Issue.2 , pp. 186-208
    • Gal-Or, E.1    Ghose, A.2
  • 6
    • 0023545076 scopus 로고
    • How to play any mental game - A completeness theorem for protocols with honest majority
    • ACM (ed.), ACM Press, New York
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game - A completeness theorem for protocols with honest majority. In: ACM (ed.) STOC 1987, pp. 218-229. ACM Press, New York (1987)
    • (1987) STOC 1987 , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 7
    • 0344899914 scopus 로고    scopus 로고
    • Sharing information on computer systems security: An economic analysis
    • Gordon, L., Loeb, M., Lucyshyn, W.: Sharing information on computer systems security: An economic analysis. Journal of Accounting and Public Policy 22(6), 461-485 (2003)
    • (2003) Journal of Accounting and Public Policy , vol.22 , Issue.6 , pp. 461-485
    • Gordon, L.1    Loeb, M.2    Lucyshyn, W.3
  • 8
    • 77955339963 scopus 로고    scopus 로고
    • When worlds collide: Information sharing for the security and anti-virus communities
    • Gordon, S., Ford, R.: When worlds collide: information sharing for the security and anti-virus communities, IBM research paper (1999)
    • (1999) IBM Research Paper
    • Gordon, S.1    Ford, R.2
  • 13
    • 64049119146 scopus 로고    scopus 로고
    • Efficient oblivious transfer protocols
    • Society for Industrial and Applied Mathematics, Philadelphia
    • Naor, M., Pinkas, B.: Efficient oblivious transfer protocols. In: SODA 2001, pp. 448-457. Society for Industrial and Applied Mathematics, Philadelphia (2001)
    • (2001) SODA 2001 , pp. 448-457
    • Naor, M.1    Pinkas, B.2
  • 14
    • 0003508562 scopus 로고    scopus 로고
    • FIPS 186-192 January
    • NIST. Digital signature standard (DSS). FIPS 186-192 (January 2000), http://csrc.nist.gov/publications/fips/fips186-2/fips186-2-change1.pdf
    • (2000) Digital Signature Standard (DSS)
  • 15
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE Computer Society, Los Alamitos
    • Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS 1986, pp. 162-167. IEEE Computer Society, Los Alamitos (1986)
    • (1986) FOCS 1986 , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.