-
1
-
-
0004115865
-
-
June
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, “RFC2560: Internet public key infrastructure online certicate status protocol - OCSP,” June 1999.
-
(1999)
RFC2560: Internet public key infrastructure online certicate status protocol - OCSP
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
2
-
-
0031354167
-
Server-supported signatures
-
N. Asokan, G. Tsudik, and M. Waidner, “Server-supported signatures,” Journal of Computer Security, vol. 5, no. 1, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.1
-
-
Asokan, N.1
Tsudik, G.2
Waidner, M.3
-
3
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
(C. Pomerance, ed) in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), Springer-Verlag, Berlin Germany, Aug
-
R. C. Merkle, “A digital signature based on a conventional encryption function,” in Advances in Cryptology - CRYPTO '87 (C. Pomerance, ed.), no. 293 in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), pp. 369-378, Springer-Verlag, Berlin Germany, Aug. 1988.
-
(1988)
Advances in Cryptology - CRYPTO '87
, Issue.293
, pp. 369-378
-
-
Merkle, R. C.1
-
4
-
-
17444427609
-
Instanteneous revocation of security capabilities
-
Aug
-
D. Boneh, X. Ding, G. Tsudik, and B. Wong, “Instanteneous revocation of security capabilities,” in Proceeding of USENIX Security Symposium 2001, Aug. 2001.
-
(2001)
Proceeding of USENIX Security Symposium 2001
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, B.4
-
6
-
-
84880864572
-
Two-party generation of dsa signatures
-
(J. Kilian, ed) 2139 in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Aug
-
P. MacKenzie and M. K. Reiter, “Two-party generation of dsa signatures,” in Advances in Cryptology - CRYPTO '01 (J. Kilian, ed.), no. 2139 in Lecture Notes in Computer Science, pp. 137-154, Springer-Verlag, Berlin Germany, Aug. 2001.
-
(2001)
Advances in Cryptology - CRYPTO '01
, pp. 137-154
-
-
MacKenzie, P.1
Reiter, M. K.2
-
7
-
-
33847692139
-
Argumenting kerberose with pubic-key crytography
-
(T. Mayfield, ed), (San Diego, California), Internet Society, Feb
-
R. Ganesan, “Argumenting kerberose with pubic-key crytography,” in Symposium on Network and Distributed Systems Security (T. Mayfield, ed.), (San Diego, California), Internet Society, Feb. 1995.
-
(1995)
Symposium on Network and Distributed Systems Security
-
-
Ganesan, R.1
-
8
-
-
0002181960
-
Digital mulitsignatures
-
C. Boyd, “Digital mulitsignatures,” Cryptography and Coding, pp. 241-246, 1989.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
9
-
-
85023809951
-
Threshold cryptosystems
-
(G. Brassard, ed) in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), Springer Verlag, Berlin Germany, Aug
-
Y. Desmedt and Y. Frankel, “Threshold cryptosystems,” in Advances in Cryptology - CRYPTO '89 (G. Brassard, ed.), no. 435 in Lecture Notes in Computer Science, (Santa Barbara, CA, USA), pp. 307-315, Springer- Verlag, Berlin Germany, Aug. 1990.
-
(1990)
Advances in Cryptology - CRYPTO '89
, Issue.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
12
-
-
0019634370
-
Password authentication with insecure communication
-
Nov
-
L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, pp. 770-772, Nov. 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 770-772
-
-
Lamport, L.1
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Journal of the ACM, vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Journal of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R. L.1
Shamir, A.2
Adleman, L. M.3
-
14
-
-
35048891868
-
Keying hash functions for message authentication
-
(N.Koblitz, ed) 1109 in Lecture Notes in Computer Science, Springer Verlag, Berlin Germany
-
M. Bellare, R. Canetti, and H. Krawczyk, “Keying hash functions for message authentication,” in Advances in Cryptology - CRYPTO '96 (N.Koblitz, ed.), no. 1109 in Lecture Notes in Computer Science, pp. 1-15, Springer- Verlag, Berlin Germany, 1996.
-
(1996)
Advances in Cryptology - CRYPTO '96
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
16
-
-
85180743529
-
-
May
-
C. Adams, P. Cain, D. Pinkas, and R. Zuccherato, “Internet x.509 public key infrastructure time stamp protocol (tsp), draft-ietf-pkix-timestamp- 15.txt,” May 2001.
-
(2001)
Internet x.509 public key infrastructure time stamp protocol (tsp), draft-ietf-pkix-timestamp- 15.txt
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
18
-
-
85180745765
-
-
“SAS plug-in web page,” available at: http://sconce.ics.uci.edu/sucses/.
-
SAS plug-in web page
-
-
-
20
-
-
0010915298
-
Cryptographic message syntax standard
-
RSA Laboratories, Redwood City, CA, USA
-
R. Laboratories, “Cryptographic message syntax standard,” Public Key Cryptography Standards 7, RSA Laboratories, Redwood City, CA, USA, 1993. Available at URL: ftp://ftp.rsa.com/pub/pkcs/. 1993.
-
(1993)
Public Key Cryptography Standards
, vol.7
-
-
Laboratories, R.1
-
23
-
-
84958063551
-
On certificate revocation and validation
-
Springer Verlag
-
P. Kocher, “On certificate revocation and validation,” in Financial Cryptography - FC '98, Lecture Notes in Computer Science, Springer- Verlag, Vol. 1465, pp. 172-177, 1998.
-
(1998)
Financial Cryptography - FC '98, Lecture Notes in Computer Science
, vol.1465
, pp. 172-177
-
-
Kocher, P.1
-
25
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. Goodrich, R. Tamassia, and A. Schwerin, “Implementation of an authenticated dictionary with skip lists and commutative hashing,” in Proceedings of DARPA DISCEX II, 2001.
-
(2001)
Proceedings of DARPA DISCEX II
-
-
Goodrich, M.1
Tamassia, R.2
Schwerin, A.3
-
26
-
-
84902482749
-
Fast digital identity revocation
-
(H. Krawczyk, ed) 1462 in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Aug
-
W. Aiello, S. Lodha, and R. Ostrovsky, “Fast digital identity revocation,” in Advances in Cryptology - CRYPTO '98 (H. Krawczyk, ed.), no. 1462 in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, Aug. 1998.
-
(1998)
Advances in Cryptology - CRYPTO '98
-
-
Aiello, W.1
Lodha, S.2
Ostrovsky, R.3
|