메뉴 건너뛰기




Volumn , Issue , 2003, Pages 170-177

Content extraction signatures using XML digital signatures and custom transforms on-demand

Author keywords

.Net framework XML signature API; content extraction signatures; dynamic signature verification; XML signature custom transforms; XML signatures

Indexed keywords

CLOSED SYSTEMS; CONTENT EXTRACTION; DYNAMIC LOADINGS; DYNAMIC SIGNATURE VERIFICATION; REVOCATION MECHANISM; TRANSFORM ALGORITHM; XML DIGITAL SIGNATURES; XML SIGNATURE;

EID: 78650194226     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775152.775176     Document Type: Conference Paper
Times cited : (22)

References (20)
  • 2
    • 0141751864 scopus 로고    scopus 로고
    • XML-signature syntax and processing
    • D. Eastlake, J. Reagle, and D. Solo, editors, Feb. 12 Last accessed: September 18, 2002
    • M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-signature syntax and processing. In D. Eastlake, J. Reagle, and D. Solo, editors, W3C Recommendation. Feb. 12 2002. [Last accessed: September 18, 2002] http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
    • (2002) W3C Recommendation
    • Bartel, M.1    Boyer, J.2    Fox, B.3    LaMacchia, B.4    Simon, E.5
  • 3
    • 84958775356 scopus 로고    scopus 로고
    • Transitive signatures based on factoring and RSA
    • Y. Zheng, editor, Proceedings of The 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002), Springer, December
    • M. Bellare and G. Neven. Transitive signatures based on factoring and RSA. In Y. Zheng, editor, Proceedings of The 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002), volume 2501 of Lecture Notes in Computer Science, pages 397-414. Springer, December 2003.
    • (2003) Lecture Notes in Computer Science , vol.2501 , pp. 397-414
    • Bellare, M.1    Neven, G.2
  • 5
    • 0003357375 scopus 로고    scopus 로고
    • Simple Object Access Protocol (SOAP) 1.1
    • 8 May, 2002 edition, Last accessed: November 15, 2002
    • D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1. W3C note 8 May, 2002 edition, 2002. [Last accessed: November 15, 2002] http://www.w3.org/ TR/2000/NOTE-SOAP-20000508.
    • (2002) W3C Note
    • Box, D.1    Ehnebuske, D.2    Kakivaya, G.3    Layman, A.4    Mendelsohn, N.5    Nielsen, H.6    Thatte, S.7    Winer, D.8
  • 6
    • 33744478570 scopus 로고    scopus 로고
    • Exclusive XML Canonicalization
    • 18 July, 2002 edition, Last accessed: July 12, 2002
    • J. Boyer, D. Eastlake, and J. Reagle. Exclusive XML Canonicalization. W3C Recommendation 18 July, 2002 edition, 2002. [Last accessed: July 12, 2002] http://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/.
    • (2002) W3C Recommendation
    • Boyer, J.1    Eastlake, D.2    Reagle, J.3
  • 7
    • 84880460170 scopus 로고    scopus 로고
    • XML-Signature XPath Filter 2.0
    • 08 November, 2002 edition, Last accessed: November 12, 2002
    • J. Boyer, M. Hughes, and J. Reagle. XML-Signature XPath Filter 2.0. W3C Recommendation 08 November, 2002 edition, 2002. [Last accessed: November 12, 2002] http://www.w3.org/TR/2002/REC-xmldsig-filter2-20021108/.
    • (2002) W3C Recommendation
    • Boyer, J.1    Hughes, M.2    Reagle, J.3
  • 9
    • 33749665781 scopus 로고    scopus 로고
    • Available online, Feb. 20 Last accessed: February 18, 2003
    • S. Brands. A technical overview of digital credentials. Available online, Feb. 20 2002. [Last accessed: February 18, 2003] http://www.xs4all.nl/ ∼brands/overview.pdf.
    • (2002) A Technical Overview of Digital Credentials
    • Brands, S.1
  • 13
    • 2442621633 scopus 로고    scopus 로고
    • version 3.0. Available online, Last accessed: September 18, 2002
    • A. Freier, P. Karlton, and P. Kocher. The SSL protocol version 3.0. Available online, 1996. [Last accessed: September 18, 2002] http://wp.netscape. com/eng/ssl3/draft302.txt.
    • (1996) The SSL Protocol
    • Freier, A.1    Karlton, P.2    Kocher, P.3
  • 14
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • Proceedings of the RSA Security Conference Cryptographers Track, Springer, February
    • R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. In Proceedings of the RSA Security Conference Cryptographers Track, volume 2271 of Lecture Notes in Computer Science, pages 244-62. Springer, February 2002.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.3    Wagner, D.4
  • 16
    • 84944878224 scopus 로고    scopus 로고
    • Transitive signature schemes
    • B. Preneel, editor, Proceedings of The Cryptographer's Track at the RSA Conference (CT-RSA 2002), Springer, December
    • S. Micali and R. L. Rivest. Transitive signature schemes. In B. Preneel, editor, Proceedings of The Cryptographer's Track at the RSA Conference (CT-RSA 2002), volume 2271 of Lecture Notes in Computer Science, pages 236-243. Springer, December 2002.
    • (2002) Lecture Notes in Computer Science , vol.2271 , pp. 236-243
    • Micali, S.1    Rivest, R.L.2
  • 18
    • 33646041848 scopus 로고    scopus 로고
    • Available online, October Slides from talk given at Cambridge University. [Last accessed: February 19, 2003]
    • R. Rivest. Two signature schemes. Available online, October 2000. Slides from talk given at Cambridge University. [Last accessed: February 19, 2003] http://theory.lcs.mit.edu/∼rivest/publications.html.
    • (2000) Two Signature Schemes
    • Rivest, R.1
  • 19
    • 74549116915 scopus 로고    scopus 로고
    • Available online, Nov. 12 Last accessed: February 25, 2003
    • D. Sax. DNS spoofing (malicious cache poisoning). Available online, Nov. 12 2000. [Last accessed: February 25, 2003] http://www.sans.org/rr/firewall/ DNSspoof.php.
    • (2000) DNS Spoofing (Malicious Cache Poisoning)
    • Sax, D.1
  • 20
    • 84949982830 scopus 로고    scopus 로고
    • Content extraction signatures
    • Proceedings of The 4th International Conference on Information Security and Cryptology (ICISC 2001), Springer, December
    • R. Steinfeld, L. Bull, and Y. Zheng. Content extraction signatures. In Proceedings of The 4th International Conference on Information Security and Cryptology (ICISC 2001), volume 2288 of Lecture Notes in Computer Science, pages 285-304. Springer, December 2001.
    • (2001) Lecture Notes in Computer Science , vol.2288 , pp. 285-304
    • Steinfeld, R.1    Bull, L.2    Zheng, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.