-
1
-
-
14844363625
-
Service-oriented computing: Key concepts and principles
-
DOI 10.1109/MIC.2005.21
-
M. Huhns and M. Singh, "Service-Oriented Computing: Key Concepts and Principles," IEEE Internet Computing, vol. 9, no. 1, pp. 75-81, Jan./Feb. 2005. (Pubitemid 40351902)
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.1
, pp. 75-81
-
-
Huhns, M.1
Singh, M.P.2
-
2
-
-
63649117166
-
Cloud computing and emerging it platforms: Vision, hype, and reality for delivering computing as the fifth utility
-
June
-
R. Buyya, C. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the Fifth Utility," Future Generation Computer Systems, vol. 25, no. 6, pp. 599-616, June 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.6
, pp. 599-616
-
-
Buyya, R.1
Yeo, C.2
Venugopal, S.3
Broberg, J.4
Brandic, I.5
-
3
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A View of Cloud Computing," Comm. ACM, vol. 53, no. 4, pp. 50-58, Apr. 2010.
-
(2010)
Comm. ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
72949096549
-
Cross-organizational erp management: How to create a successful business case?
-
S. Shin, and S. Ossowski, eds., Mar.
-
S. Eckartz, M. Daneva, R. Wieringa, and J.V. Hillegersberg, "Cross-Organizational ERP Management: How to Create a Successful Business Case?," Proc. ACM Symp. Applied Computing, S. Shin, and S. Ossowski, eds., pp. 1599-1604, Mar. 2009.
-
(2009)
Proc. ACM Symp. Applied Computing
, pp. 1599-1604
-
-
Eckartz, S.1
Daneva, M.2
Wieringa, R.3
Hillegersberg, J.V.4
-
5
-
-
10644247823
-
A case study of an inter-enterprise workflow-supported supply chain management system
-
Mar.
-
J. Liu, S. Zhang, and J. Hu, "A Case Study of an Inter-Enterprise Workflow-Supported Supply Chain Management System," Information & Management, vol. 42, no. 3, pp. 441-454, Mar. 2005.
-
(2005)
Information & Management
, vol.42
, Issue.3
, pp. 441-454
-
-
Liu, J.1
Zhang, S.2
Hu, J.3
-
6
-
-
0007548916
-
Crossflow: Cross-organizational workflow management for service outsourcing in dynamic virtual enterprises
-
Mar.
-
P. Grefen, K. Aberer, H. Ludwig, and Y. Hoffner, "CrossFlow: Cross-Organizational Workflow Management for Service Outsourcing in Dynamic Virtual Enterprises," IEEE Data Eng. Bull., vol. 24, no. 1, pp. 52-57, Mar. 2001.
-
(2001)
IEEE Data Eng. Bull.
, vol.24
, Issue.1
, pp. 52-57
-
-
Grefen, P.1
Aberer, K.2
Ludwig, H.3
Hoffner, Y.4
-
7
-
-
0001078603
-
Exotica/fmqm: A persistent message-based architecture for distributed workflow management
-
Aug.
-
G. Alonso, C. Mohan, R. Gunthor, D. Agrawal, A.E. Abbadi, and M. Kamath, "Exotica/FMQM: A Persistent Message-Based Architecture for Distributed Workflow Management," Proc. IFIP WG8.1 Working Conf. Information Systems for Decentralized Organizations, Aug. 1995.
-
(1995)
Proc. IFIP WG8.1 Working Conf. Information Systems for Decentralized Organizations
-
-
Alonso, G.1
Mohan, C.2
Gunthor, R.3
Agrawal, D.4
Abbadi, A.E.5
Kamath, M.6
-
8
-
-
20844432808
-
Chinese wall security for decentralized workflow management systems
-
V. Atluri, S. Chun, and P. Mazzoleni, "Chinese Wall Security for Decentralized Workflow Management Systems," J. Computer Security, vol. 12, no. 6, pp. 799-840, Dec. 2004. (Pubitemid 41652780)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.6
, pp. 799-840
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
9
-
-
0032024371
-
From centralized workflow specification to distributed workflow execution
-
Mar.
-
P. Muth, D. Wodtke, J. Weissenfels, A. Dittrich, and G. Weikum, "From Centralized Workflow Specification to Distributed Workflow Execution," J. Intelligent Information Systems, vol. 10, no. 2, pp. 159-184, Mar. 1998.
-
(1998)
J. Intelligent Information Systems
, vol.10
, Issue.2
, pp. 159-184
-
-
Muth, P.1
Wodtke, D.2
Weissenfels, J.3
Dittrich, A.4
Weikum, G.5
-
10
-
-
11244310492
-
Rainman: A workflow system for the internet
-
Dec.
-
S. Paul, E. Park, and J. Chaar, "RainMan: A Workflow System for the Internet," Proc. USENIX Symp. Internet Technologies and Systems, p. 15, Dec. 1997.
-
(1997)
Proc. USENIX Symp. Internet Technologies and Systems
, pp. 15
-
-
Paul, S.1
Park, E.2
Chaar, J.3
-
11
-
-
0033650839
-
Injecting rbac to secure aweb-based workflow system
-
July
-
G. Ahn, R. Sandhu, M. Kang, and J. Park, "Injecting RBAC to Secure aWeb-Based Workflow System," Proc. Fifth ACM Workshop Role-Based Access Control (RBAC '00), pp. 1-10, July 2000.
-
(2000)
Proc. Fifth ACM Workshop Role-Based Access Control (RBAC '00)
, pp. 1-10
-
-
Ahn, G.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
13
-
-
0008235326
-
-
Technical Report UGA-CS-LSDIS-TR-99-010, Univ. of Georgia, June
-
J. Miller, M. Fan, S. Wu, I. Arpinar, A. Sheth, and K. Kochut, "Security for the METEOR Workflow Management System," Technical Report UGA-CS-LSDIS-TR-99-010, Univ. of Georgia, June 1999.
-
(1999)
Security for the METEOR Workflow Management System
-
-
Miller, J.1
Fan, M.2
Wu, S.3
Arpinar, I.4
Sheth, A.5
Kochut, K.6
-
14
-
-
38049080656
-
Traceability and integrity of execution in distributed workflow management systems
-
J. Biskup and J. Lopez, eds.
-
F. Montagut and R. Molva, "Traceability and Integrity of Execution in Distributed Workflow Management Systems," Proc. 12th European Symp. Research in Computer Security (ESORICS '07), J. Biskup and J. Lopez, eds., pp. 251-266, 2007.
-
(2007)
Proc. 12th European Symp. Research in Computer Security (ESORICS '07)
, pp. 251-266
-
-
Montagut, F.1
Molva, R.2
-
15
-
-
84864769201
-
-
White Paper WFMC-TC-1019, The Workflow Management Coalition Specification, Feb.
-
"Workflow Management Coalition, Workflow Security Considerations," White Paper WFMC-TC-1019, The Workflow Management Coalition Specification, Feb. 1998.
-
(1998)
Workflow Management Coalition, Workflow Security Considerations
-
-
-
16
-
-
24944562007
-
Hierarchical identity based encryption with constant size ciphertext
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
D. Boneh, X. Boyen, and E. Goh, "Hierarchical Identity Based Encryption with Constant Size Ciphertext," EUROCRYPT: Proc. Advances in Cryptology, R. Cramer, ed., pp. 440-456, May 2005. (Pubitemid 41313968)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 440-456
-
-
Boneh, D.1
Boyen, X.2
Goh, E.-J.3
-
17
-
-
70349557354
-
Hierarchical id-based cryptography
-
Y. Zheng, ed., Dec.
-
C. Gentry and A. Silverberg, "Hierarchical ID-Based Cryptography," ASIACRYPT: Proc. Advances in Cryptology, Y. Zheng, ed., pp. 548-566, Dec. 2002.
-
(2002)
ASIACRYPT: Proc. Advances in Cryptology
, pp. 548-566
-
-
Gentry, C.1
Silverberg, A.2
-
18
-
-
38149048400
-
Multi-key hierarchical identity-based signatures
-
S. Galbraith, ed., Dec.
-
H.W. Lim and K. Paterson, "Multi-Key Hierarchical Identity-Based Signatures," Proc. 11th IMA Int'l Conf. Cryptography and Coding (IMA '07), S. Galbraith, ed., pp. 384-402, Dec. 2007.
-
(2007)
Proc. 11th IMA Int'l Conf. Cryptography and Coding (IMA '07)
, pp. 384-402
-
-
Lim, H.W.1
Paterson, K.2
-
19
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented authorization management
-
Aug.
-
R. Thomas and R. Sandhu, "Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management," Proc. 11th IFIP Int'l Conf. Database Security, pp. 166-181, Aug. 1997.
-
(1997)
Proc. 11th IFIP Int'l Conf. Database Security
, pp. 166-181
-
-
Thomas, R.1
Sandhu, R.2
-
21
-
-
0346608553
-
Security for workflow systems
-
DOI 10.1016/S1363-4127(01)00207-2
-
V. Atluri, "Security for Workflow Systems," Information Security technical report, vol. 6, no. 2, pp. 59-68, 2001. (Pubitemid 33663939)
-
(2001)
Information Security Technical Report
, vol.6
, Issue.2
, pp. 59-68
-
-
Atluri, V.1
-
22
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. Blakley and D. Chaum, eds., Aug.
-
A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," CRYPTO: Proc. Advances in Cryptology, G. Blakley and D. Chaum, eds., pp. 47-53, Aug. 1985.
-
(1985)
CRYPTO: Proc. Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
23
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," CRYPTO: Proc. Advances in Cryptology, J. Kilian, ed., pp. 213-229, Aug. 2001. (Pubitemid 33317917)
-
(2001)
Lecture notes in computer science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
24
-
-
35248844436
-
An identity-based signature from gap diffie-hellman groups
-
Y.G. Desmedt, ed., Aug.
-
J.C. Cha and J.H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups," Proc. Sixth Int'l Workshop Theory and Practice in Public Key Cryptography (PKC '03), Y.G. Desmedt, ed., pp. 18-30, Aug. 2001.
-
(2001)
Proc. Sixth Int'l Workshop Theory and Practice in Public Key Cryptography (PKC '03)
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
-
25
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
K. Nyberg and H. Heys, eds., Aug.
-
F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings," Proc. Ninth Int'l Workshop Selected Areas in Cryptography (SAC '02), K. Nyberg and H. Heys, eds., pp. 310-324, Aug. 2003.
-
(2003)
Proc. Ninth Int'l Workshop Selected Areas in Cryptography (SAC '02)
, pp. 310-324
-
-
Hess, F.1
-
26
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest, "A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks," SIAM J. Computing, vol. 17, no. 2, pp. 281-308, Apr. 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
27
-
-
44449147492
-
Efficient sequential aggregate signed data
-
DOI 10.1007/978-3-540-78967-3-4, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
G. Neven, "Efficient Sequential Aggregate Signed Data," EUROCRYPT: Proc. Advances in Cryptology, N. Smart, ed., pp. 52-69, Apr. 2008. (Pubitemid 351762823)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 52-69
-
-
Neven, G.1
-
28
-
-
53249117524
-
Pairings for cryptographers
-
Sept.
-
S. Galbraith, K. Paterson, and N. Smart, "Pairings for Cryptographers," Discrete Applied Math., vol. 156, no. 16, pp. 3113-3121, Sept. 2008.
-
(2008)
Discrete Applied Math.
, vol.156
, Issue.16
, pp. 3113-3121
-
-
Galbraith, S.1
Paterson, K.2
Smart, N.3
-
29
-
-
84864773824
-
-
MIRACL, Shamus Software Ltd.
-
MIRACL, Shamus Software Ltd., http://www.shamus.ie/, 2012.
-
(2012)
-
-
-
30
-
-
84864759544
-
-
The Pairing-Based Cryptography (PBC) Library, Stanford Univ.
-
The Pairing-Based Cryptography (PBC) Library, Stanford Univ., http://crypto.stanford.edu/pbc/, 2012.
-
(2012)
-
-
-
31
-
-
84946832010
-
Supersingular curves in cryptography
-
Advances in Cryptology - ASIACRYPT 2001
-
S. Galbraith, "Supersingular Curves in Cryptography," ASIACRYPT: Proc. Advances in Cryptology, C. Boyd, ed., pp. 495-513, Dec. 2001. (Pubitemid 33371203)
-
(2002)
Lecture notes in computer science
, Issue.2248
, pp. 495-513
-
-
Galbraith, S.D.1
-
32
-
-
33746042155
-
Compact group signatures without random oracles
-
DOI 10.1007/11761679-26, Advances in Cryptology - EUROCRYPT 2006 - 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
X. Boyen and B. Waters, "Compact Group Signatures Without Random Oracles," EUROCRYPT: Proc. Advances in Cryptology, S. Vaudenay, ed., pp. 427-444, May 2006. (Pubitemid 44072254)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4004 LNCS
, pp. 427-444
-
-
Boyen, X.1
Waters, B.2
-
33
-
-
22144445920
-
The weil pairing, and its efficient calculation
-
DOI 10.1007/s00145-004-0315-8
-
V. Miller, "The Weil Pairing, and Its Efficient Calculation," J. Cryptology, vol. 17, no. 4, pp. 235-261, Sept. 2004. (Pubitemid 41201458)
-
(2004)
Journal of Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
-
35
-
-
33749564652
-
-
Cryptology ePrint Archive, Report 2006/172, available at May
-
R. Granger and N. Smart, On Computing Products of Pairings, Cryptology ePrint Archive, Report 2006/172, available at http://eprint.iacr.org/2006/172, May 2006.
-
(2006)
On Computing Products of Pairings
-
-
Granger, R.1
Smart, N.2
-
36
-
-
0011255177
-
Internet x.509 public key infrastructure certificate and certificate revocation list (crl) profile
-
RFC Apr.
-
R. Housley, W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," The Internet Eng. Task Force (IETF), vol. RFC 3280, Apr. 2002.
-
(2002)
The Internet Eng. Task Force (IETF)
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
37
-
-
46849096072
-
Towards secure execution orders for composite web services
-
July
-
J. Biskup, B. Carminati, E. Ferrari, F. Müller, and S. Wortmann, "Towards Secure Execution Orders for Composite Web Services," Proc. IEEE Int'l Conf. Web Serices (ICWS '07), pp. 489-496, July 2007.
-
(2007)
Proc. IEEE Int'l Conf. Web Serices (ICWS '07)
, pp. 489-496
-
-
Biskup, J.1
Carminati, B.2
Ferrari, E.3
Müller, F.4
Wortmann, S.5
-
38
-
-
62949132312
-
Secure web service workflow execution
-
Apr.
-
C. Rudolph, N. Kuntze, and Z. Velikova, "Secure Web Service Workflow Execution," Electronic Notes in Theoretical Computer Science, vol. 236, pp. 33-46, Apr. 2009.
-
(2009)
Electronic Notes in Theoretical Computer Science
, vol.236
, pp. 33-46
-
-
Rudolph, C.1
Kuntze, N.2
Velikova, Z.3
-
39
-
-
74549115425
-
Towards security in decentralized workflows
-
Oct.
-
Z. Velikova, J. Schütte, and N. Kuntze, "Towards Security in Decentralized Workflows," Proc. Int'l Conf. Ultra Modern Telecomm. & Workshops (ICUMT '09), pp. 1-6, Oct. 2009.
-
(2009)
Proc. Int'l Conf. Ultra Modern Telecomm. & Workshops (ICUMT '09)
, pp. 1-6
-
-
Velikova, Z.1
Schütte, J.2
Kuntze, N.3
-
40
-
-
63649096038
-
Security architecture for virtual organizations of business web services
-
Apr.
-
F. Kerschbaum and P. Robinson, "Security Architecture for Virtual Organizations of Business Web Services" J. Systems Architecture, vol. 55, no. 4, pp. 224-232, Apr. 2009.
-
(2009)
J. Systems Architecture
, vol.55
, Issue.4
, pp. 224-232
-
-
Kerschbaum, F.1
Robinson, P.2
-
42
-
-
34247861351
-
A static compliance-checking framework for business process models
-
DOI 10.1147/sj.462.0335
-
A. Liu, S. Müller, and K. Xu, "A Static Compliance-Checking Framework for Business Process Models," IBM Systems J., vol. 46, no. 2, pp. 335-361, Nov. 2007. (Pubitemid 46915268)
-
(2007)
IBM Systems Journal
, vol.46
, Issue.2
, pp. 335-361
-
-
Liu, Y.1
Muller, S.2
Xu, K.3
-
43
-
-
38049150939
-
Modeling control objectives for business process compliance
-
G. Alonso, P. Dadam, and M. Rosemann, eds., Sept.
-
S. Sadiq, G. Governatori, and K. Namiri, "Modeling Control Objectives for Business Process Compliance," Proc. Fifth Int'l Conf. Business Process Management (BPM '07), G. Alonso, P. Dadam, and M. Rosemann, eds., pp. 149-164, Sept. 2007.
-
(2007)
Proc. Fifth Int'l Conf. Business Process Management (BPM '07)
, pp. 149-164
-
-
Sadiq, S.1
Governatori, G.2
Namiri, K.3
-
44
-
-
84864763042
-
-
Pub. L. No. 107-204, 116 Stat. 745, enacted 2002-07-30, The Sarbanes-Oxley Act of 2002
-
Pub. L. No. 107-204, 116 Stat. 745, enacted 2002-07-30, The Sarbanes-Oxley Act of 2002.
-
-
-
-
49
-
-
84949747356
-
An authorization model for workflows
-
V. Atluri and W. Huang, "An Authorization Model for Workflows," Proc. Fourth European Symp. Research in Computer Security (ESORICS '96), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, eds., pp. 44-64, 1996. (Pubitemid 126128893)
-
(1996)
Lecture notes in computer science
, Issue.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
50
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb.
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Computer Systems, vol. 2, no. 1, pp. 65-104, Feb. 1999.
-
(1999)
ACM Trans. Computer Systems
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
51
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
May
-
M. Kang, J. Park, and J. Froscher, "Access Control Mechanisms for Inter-Organizational Workflow," Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01), pp. 66-74, May 2001.
-
(2001)
Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01)
, pp. 66-74
-
-
Kang, M.1
Park, J.2
Froscher, J.3
-
52
-
-
0030676973
-
Anonymous connections and onion routing
-
May
-
P. Syverson, D. Goldschlag, and M. Reed, "Anonymous Connections and Onion Routing," Proc. IEEE Symp. Security and Privacy, pp. 44-54, May 1997.
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
53
-
-
85024290278
-
Group signatures
-
D. Davies, ed.
-
D. Chaum and E.V. Heyst, "Group Signatures," EUROCRYPT '91: Proc. Advances in Cryptology, D. Davies, ed., pp. 257-265, 1991.
-
(1991)
EUROCRYPT '91: Proc. Advances in Cryptology
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
54
-
-
26444464784
-
Policy-based cryptography and applications
-
Finacial Cryptography and Data Security: 9th International Conference, FC 2005. Revised Papers
-
W. Bagga and R. Molva, "Policy-Based Cryptography and Applications," Proc. Ninth Int'l Conf. Financial Cryptography and Data Security (FC '05), A. Patrick and M. Yung, eds., pp. 72-87, Feb. 2005. (Pubitemid 41425464)
-
(2005)
Lecture Notes in Computer Science
, vol.3570
, pp. 72-87
-
-
Bagga, W.1
Molva, R.2
-
55
-
-
33744924899
-
Efficient authentication of electronic document workflow
-
Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings
-
Y. Wu, "Efficient Authentication of Electronic Document Workflow," Proc. First SKLOIS Conf. Information Security and Cryptology (CISC '05), D. Feng, D. Lin, and M. Yung, eds., pp. 101-112, Dec. 2005. (Pubitemid 43848647)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3822 LNCS
, pp. 101-112
-
-
Wu, Y.1
-
56
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
E. Biham, ed., May
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," EUROCRYPT: Proc. Advances in Cryptology, E. Biham, ed., pp. 416-432, May 2003.
-
(2003)
EUROCRYPT: Proc. Advances in Cryptology
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
|