-
1
-
-
85062838317
-
Safeguarding cryptographic keys
-
New York,
-
Blakley, G.R., 1979. Safeguarding cryptographic keys. Proc. AFIPS Note. Comput. Conf., New York, 48:313-317.
-
(1979)
Proc. AFIPS Note. Comput. Conf.
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
2
-
-
38049125096
-
Reducing trust in the PKG in identitybased Cryptosystems
-
Goyal, V., 2007. Reducing trust in the PKG in identitybased Cryptosystems. Adv. Cryptol. Crypto. LNCS, 4622: 430-477.
-
(2007)
Adv. Cryptol. Crypto. LNCS
, vol.4622
, pp. 430-477
-
-
Goyal, V.1
-
3
-
-
84957640277
-
Fair Cryptosystems, revied
-
Copperrmoth, D. August, Springer Verlag (LNCS 963), Berlin.
-
Killian, J. and T. Leighton, 1995. Fair Cryptosystems, revied. In: Copperrmoth, D. (Ed.), Advances in Cryptology-CRYPTO 195, USA, August, pp: 208-221. Springer Verlag (LNCS 963), Berlin.
-
(1995)
Advances in Cryptology-CRYPTO 195, USA
, pp. 208-221
-
-
Killian, J.1
Leighton, T.2
-
4
-
-
62849086420
-
Design of DLbased certificateless digital signatures
-
Lein, H., R. Jian and L. Changlu, 2009. Design of DLbased certificateless digital signatures. J. Syst. Software, 82(5): 789-793.
-
(2009)
J. Syst. Software
, vol.82
, Issue.5
, pp. 789-793
-
-
Lein, H.1
Jian, R.2
Changlu, L.3
-
5
-
-
78651593639
-
Forward-secure certificatebased encryption and its generic construction
-
Lu, Y. and L. Jiguo, 2010. Forward-secure certificatebased encryption and its generic construction. J. Network., 5(5): 527-534.
-
(2010)
J. Network
, vol.5
, Issue.5
, pp. 527-534
-
-
Lu, Y.1
Jiguo, L.2
-
6
-
-
78651591128
-
Threshold certificate-based encryption
-
Lu, Y., L. Jiguo and X. Junmo, 2009. Threshold certificate-based encryption. J. Software, 4(3): 210-217.
-
(2009)
J. Software
, vol.4
, Issue.3
, pp. 210-217
-
-
Lu, Y.1
Jiguo, L.2
Junmo, X.3
-
7
-
-
84866753656
-
A key escrow system with warrant bounds
-
Springer-Verlang (LNCS, 963), Berlin.
-
Lenstra. A.K., P. Winkler and Y. Yacobi, A key escrow system with warrant bounds, Advances in Cryptolog-CRYPTO'95, USA, August. Springer-Verlang (LNCS, 963), Berlin.
-
Advances in Cryptolog-CRYPTO'95, USA, August
-
-
Lenstra, A.K.1
Winkler, P.2
Yacobi, Y.3
-
8
-
-
0030270929
-
A public-key-based key escrow system
-
Nechvatal, J., 1996. A public-key-based key escrow system. J. Syst. Software, 35(1): 73-83.
-
(1996)
J. Syst. Software
, vol.35
, Issue.1
, pp. 73-83
-
-
Nechvatal, J.1
-
10
-
-
84860673839
-
Key escrow scheme for flexible placing of escrow agent
-
Qiang, F. and X. Dongqing, 2005. Key escrow scheme for flexible placing of escrow agent. Comput. Eng. Appli., 41(10): 122-123.
-
(2005)
Comput. Eng. Appli
, vol.41
, Issue.10
, pp. 122-123
-
-
Qiang, F.1
Dongqing, X.2
-
11
-
-
0018545449
-
How to share a secret
-
Shamir, A., 1979. How to share a secret. Comm. ACM, 22: 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
35748976265
-
Certificateless undeniable signature scheme
-
Shan-shan, D., 2008. Certificateless undeniable signature scheme. Inform. Sci. Int. J., 178(3): 742-755.
-
(2008)
Inform. Sci. Int. J
, vol.178
, Issue.3
, pp. 742-755
-
-
Shan-shan, D.1
-
13
-
-
0035242307
-
A key escrow sche me for escrow agency of arbitrary number
-
Xie, D. and Z. Dafang, 2001. A key escrow sche me for escrow agency of arbitrary number. Chin. J. Electr., 29(2): 172-174.
-
(2001)
Chin. J. Electr
, vol.29
, Issue.2
, pp. 172-174
-
-
Xie, D.1
Dafang, Z.2
-
14
-
-
78651566090
-
Security mediated certificateless signatures without pairing
-
Zhongmei, W., W. Jian and L. Jiguo, 2010. Security mediated certificateless signatures without pairing. J. Comput., 5(12): 1862-1869.
-
(2010)
J. Comput
, vol.5
, Issue.12
, pp. 1862-1869
-
-
Zhongmei, W.1
Jian, W.2
Jiguo, L.3
|