메뉴 건너뛰기




Volumn , Issue , 2002, Pages

Experimenting with Server-Aided Signatures

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; DENIAL-OF-SERVICE ATTACK; DIGITAL DEVICES;

EID: 84870298493     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (36)

References (26)
  • 3
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • (C. Pomerance, ed) in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), Springer-Verlag, Berlin Germany, Aug
    • R. C. Merkle, “A digital signature based on a conventional encryption function,” in Advances in Cryptology - CRYPTO '87 (C. Pomerance, ed.), no. 293 in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), pp. 369-378, Springer-Verlag, Berlin Germany, Aug. 1988.
    • (1988) Advances in Cryptology - CRYPTO '87 , Issue.293 , pp. 369-378
    • Merkle, R. C.1
  • 6
    • 84880864572 scopus 로고    scopus 로고
    • Two-party generation of dsa signatures
    • (J. Kilian, ed) 2139 in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Aug
    • P. MacKenzie and M. K. Reiter, “Two-party generation of dsa signatures,” in Advances in Cryptology - CRYPTO '01 (J. Kilian, ed.), no. 2139 in Lecture Notes in Computer Science, pp. 137-154, Springer-Verlag, Berlin Germany, Aug. 2001.
    • (2001) Advances in Cryptology - CRYPTO '01 , pp. 137-154
    • MacKenzie, P.1    Reiter, M. K.2
  • 7
    • 33847692139 scopus 로고
    • Argumenting kerberose with pubic-key crytography
    • (T. Mayfield, ed), (San Diego, California), Internet Society, Feb
    • R. Ganesan, “Argumenting kerberose with pubic-key crytography,” in Symposium on Network and Distributed Systems Security (T. Mayfield, ed.), (San Diego, California), Internet Society, Feb. 1995.
    • (1995) Symposium on Network and Distributed Systems Security
    • Ganesan, R.1
  • 8
    • 0002181960 scopus 로고
    • Digital mulitsignatures
    • C. Boyd, “Digital mulitsignatures,” Cryptography and Coding, pp. 241-246, 1989.
    • (1989) Cryptography and Coding , pp. 241-246
    • Boyd, C.1
  • 9
    • 85023809951 scopus 로고
    • Threshold cryptosystems
    • (G. Brassard, ed) in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), Springer Verlag, Berlin Germany, Aug
    • Y. Desmedt and Y. Frankel, “Threshold cryptosystems,” in Advances in Cryptology - CRYPTO '89 (G. Brassard, ed.), no. 435 in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), pp. 307-315, Springer- Verlag, Berlin Germany, Aug. 1990.
    • (1990) Advances in Cryptology - CRYPTO '89 , Issue.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 12
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • Nov
    • L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, pp. 770-772, Nov. 1981.
    • (1981) Communications of the ACM , vol.24 , pp. 770-772
    • Lamport, L.1
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Journal of the ACM, vol. 21, pp. 120-126, Feb. 1978.
    • (1978) Journal of the ACM , vol.21 , pp. 120-126
    • Rivest, R. L.1    Shamir, A.2    Adleman, L. M.3
  • 14
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • (N.Koblitz, ed) 1109 in Lecture Notes in Computer Science, Springer Verlag, Berlin Germany
    • M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology - CRYPTO '96 (N.Koblitz, ed.), no. 1109 in Lecture Notes in Computer Science, pp. 1-15, Springer- Verlag, Berlin Germany, 1996.
    • (1996) Advances in Cryptology - CRYPTO '96 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 18
    • 85180745765 scopus 로고    scopus 로고
    • “SAS plug-in web page,” available at: http://sconce.ics.uci.edu/sucses/.
    • SAS plug-in web page
  • 20
    • 0010915298 scopus 로고
    • Cryptographic message syntax standard
    • RSA Laboratories, Redwood City, CA, USA
    • R. Laboratories, “Cryptographic message syntax standard,” Public Key Cryptography Standards 7, RSA Laboratories, Redwood City, CA, USA, 1993. Available at URL: ftp://ftp.rsa.com/pub/pkcs/. 1993.
    • (1993) Public Key Cryptography Standards , vol.7
    • Laboratories, R.1
  • 24
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • (San Antonio, Texas), Jan
    • M. Naor and K. Nissim, “Certificate revocation and certificate update,” in Proceedings 7th USENIX Security Symposium (San Antonio, Texas), Jan 1998.
    • (1998) Proceedings 7th USENIX Security Symposium
    • Naor, M.1    Nissim, K.2
  • 25
    • 84964426510 scopus 로고    scopus 로고
    • Implementation of an authenticated dictionary with skip lists and commutative hashing
    • M. Goodrich, R. Tamassia, and A. Schwerin, “Implementation of an authenticated dictionary with skip lists and commutative hashing,” in Proceedings of DARPA DISCEX II, 2001.
    • (2001) Proceedings of DARPA DISCEX II
    • Goodrich, M.1    Tamassia, R.2    Schwerin, A.3
  • 26
    • 84902482749 scopus 로고    scopus 로고
    • Fast digital identity revocation
    • (H. Krawczyk, ed) 1462 in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Aug
    • W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” in Advances in Cryptology - CRYPTO '98 (H. Krawczyk, ed.), no. 1462 in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Aug. 1998.
    • (1998) Advances in Cryptology - CRYPTO '98
    • Aiello, W.1    Lodha, S.2    Ostrovsky, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.