메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Consumable Credentials in Logic-Based Access-Control Systems

Author keywords

[No Author keywords available]

Indexed keywords

AUTHORIZATION; COMPUTATION THEORY; COMPUTER CIRCUITS; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY;

EID: 80052494019     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (19)

References (49)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI’s linked local name spaces
    • Oct
    • M. Abadi. On SDSI’s linked local name spaces. Journal of Computer Security, 6(1–2):3–21, Oct. 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1–2 , pp. 3-21
    • Abadi, M.1
  • 23
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030–1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 27
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithm
    • T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, 31:465–472, 1985.
    • (1985) IEEE Transactions on Information Theory , vol.31 , pp. 465-472
    • ElGamal, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.