-
1
-
-
0037862948
-
Distributing Internet Services to the Networks Edge
-
Jun.
-
A. C. Weaver and M. W. Condtry, "Distributing Internet Services to The Networks Edge", IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404-411, Jun. 2003.
-
(2003)
IEEE Trans. Ind. Electron.
, vol.50
, Issue.3
, pp. 404-411
-
-
Weaver, A.C.1
Condtry, M.W.2
-
2
-
-
79956280962
-
JXTA-OVERLAY: A P2P Platform for Distributed, Collaborative and Ubiquitous Computing
-
Oct.
-
L. Barolli and F. Xhafa, "JXTA-OVERLAY: A P2P Platform for Distributed, Collaborative and Ubiquitous Computing", IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163-2172, Oct. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.58
, Issue.6
, pp. 2163-2172
-
-
Barolli, L.1
Xhafa, F.2
-
3
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Nov.
-
L. Lamport, "Password Authentication with Insecure Communication", Commun. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
4
-
-
84957019437
-
Privacy Protection for Transactions of Digital Goods
-
Springer-Verlag, London, UK
-
F. Bao, R. H. Deng, "Privacy Protection for Transactions of Digital Goods", Proceedings of the Third International Conference on Information and Communications Security (ICICS '01), Springer-Verlag, London, UK, pp. 202-213.
-
Proceedings of the Third International Conference on Information and Communications Security (ICICS '01)
, pp. 202-213
-
-
Bao, F.1
Deng, R.H.2
-
6
-
-
84893564604
-
Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks
-
ePrint Archive, Report 2012/107
-
G. Wang, J. Yu, and Q. Xie, "Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks", IACR Cryptology ePrint Archive, Report 2012/107, http://eprint.iacr.org/2012/107.
-
IACR Cryptology
-
-
Wang, G.1
Yu, J.2
Xie, Q.3
-
7
-
-
0034225062
-
User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks
-
W. B. Lee and C. C. Chang, "User Identification and Key Distribution Maintaining Anonymity for Distributed Computer Networks", Computer Systems Science and Engineering, vol. 15, no. 4, pp. 113-116, 2000.
-
(2000)
Computer Systems Science and Engineering
, vol.15
, Issue.4
, pp. 113-116
-
-
Lee, W.B.1
Chang, C.C.2
-
8
-
-
1542335490
-
Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks
-
T.-S. Wu and C.-L. Hsu, "Efficient User Identification Scheme with Key Distribution Preserving Anonymity for Distributed Computer Networks", Computers and Security, vol. 23, no. 2, pp. 120-125, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.2
, pp. 120-125
-
-
Wu, T.-S.1
Hsu, C.-L.2
-
9
-
-
10644225185
-
New Efficient User Identification and Key Distribution Scheme Providing Enhanced Security
-
Y. Yang, S.Wang, F. Bao, J.Wang, and R. H. Deng, "New Efficient User Identification and Key Distribution Scheme Providing Enhanced Security", Computers and Security, vol. 23, no. 8, pp. 697-704, 2004.
-
(2004)
Computers and Security
, vol.23
, Issue.8
, pp. 697-704
-
-
Yang, Y.1
Wang, S.2
Bao, F.3
Wang, J.4
Deng, R.H.5
-
10
-
-
33748125161
-
A Secure Identification and Key Agreement Protocol with User Anonymity (sika)
-
K. V. Mangipudi and R. S. Katti, "A Secure Identification and Key Agreement Protocol with User Anonymity (sika)", Computers and Security, vol. 25, no. 6, pp. 420-425, 2006.
-
(2006)
Computers and Security
, vol.25
, Issue.6
, pp. 420-425
-
-
Mangipudi, K.V.1
Katti, R.S.2
-
11
-
-
56949092341
-
A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks
-
C.-L. Hsu and Y.-H. Chuang, "A Novel User Identification Scheme with Key Distribution Preserving User Anonymity for Distributed Computer Networks", Inf. Sci., vol. 179, no. 4, pp. 422-429, 2009.
-
(2009)
Inf. Sci.
, vol.179
, Issue.4
, pp. 422-429
-
-
Hsu, C.-L.1
Chuang, Y.-H.2
-
12
-
-
80053654561
-
A Secure Single Sign-on Mechanism for Distributed Computer Networks
-
C.-C. Chang and C.-Y. Lee, "A Secure Single Sign-on Mechanism for Distributed Computer Networks", IEEE Transactions on Industrial Electronics, vol. 59, no. 1, pp. 629-637, 2012.
-
(2012)
IEEE Transactions on Industrial Electronics
, vol.59
, Issue.1
, pp. 629-637
-
-
Chang, C.-C.1
Lee, C.-Y.2
-
13
-
-
12344258539
-
Efficient Signature Generation by Smart Cards
-
C.P. Schnorr, "Efficient Signature Generation by Smart Cards", J. Cryptology, vol. 4, no. 3, pp. 161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
14
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof-Systems
-
Feb.
-
S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof-Systems", SIAM J. Computing, vol. 18, no. 1, pp. 186-208, Feb. 1989.
-
(1989)
SIAM J. Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
84885890418
-
A Generic Construction of Dynamic Single Sign-on with Strong Security
-
Proc. of SecureComm'10, Springer
-
J. Han, Y. Mu, W. Susilo, and J. Yan, "A Generic Construction of Dynamic Single Sign-on with Strong Security," in Proc. of SecureComm'10, pp. 181-198, LNICS 50, Springer, 2010.
-
(2010)
LNICS
, vol.50
, pp. 181-198
-
-
Han, J.1
Mu, Y.2
Susilo, W.3
Yan, J.4
-
17
-
-
84945119254
-
Entity Authentication and Key Distribution
-
M. Bellare and P. Rogaway, "Entity Authentication and Key Distribution", CRYPTO, pp. 232-249, 1993.
-
(1993)
CRYPTO
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
18
-
-
0000537828
-
Efficient Identification and Signatures for Smart Cards
-
C.P. Schnorr, "Efficient Identification and Signatures for Smart Cards", CRYPTO ,pp. 239-252, 1989.
-
(1989)
CRYPTO
, pp. 239-252
-
-
Schnorr, C.P.1
-
19
-
-
84937408891
-
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
-
M. Bellare and A. Palacio, "GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks", CRYPTO, pp. 162-177, 2002.
-
(2002)
CRYPTO
, pp. 162-177
-
-
Bellare, M.1
Palacio, A.2
-
20
-
-
84927727752
-
Security Proofs for Signature Schemes
-
D. Pointcheval, J. Stern, "Security Proofs for Signature Schemes", EUROCRYPT, pp. 387-398, 1996.
-
(1996)
EUROCRYPT
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
21
-
-
0000901529
-
Security Arguments for Digital Signatures and Blind Signatures
-
D. Pointcheval, J. Stern, "Security Arguments for Digital Signatures and Blind Signatures", J.Cryptology, vol.13, no.3, pp. 361-369, 2000.
-
(2000)
J.Cryptology
, vol.13
, Issue.3
, pp. 361-369
-
-
Pointcheval, D.1
Stern, J.2
-
22
-
-
0021555016
-
A "Paradoxical" Solution to the Signature Problem
-
Extended Abstract
-
S. Goldwasser, S. Micali, and L. Ronald, "A "Paradoxical" Solution to the Signature Problem (Extended Abstract)", FOCS, pp. 441-448, 1984.
-
(1984)
FOCS
, pp. 441-448
-
-
Goldwasser, S.1
Micali, S.2
Ronald, L.3
-
23
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
S. Goldwasser, S. Micali, and R. L. Rivest, "A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks", SIAM J. Comput., vol. 17, no. 2, pp. 281-308, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
|