-
1
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
A. Menezes, T. Okamoto, S. Vanstone, (1993), 'Reducing elliptic curve logarithms to logarithms in a finite field', Vol. 39, IEEE Tran. on Info.Th., pp.1639-1646.
-
(1993)
IEEE Tran. on Info.Th.
, vol.39
, pp. 1639-1646
-
-
Menezes, A.1
Okamoto, T.2
Vanstone, S.3
-
2
-
-
85014448561
-
Mitigating Phishing by a New ID-based Chameleon Hash without Key Exposure
-
Gold Coast, Australia, University of Queensland
-
Qiong Ren, Yi Mu, and Willy Susilo, (2007), 'Mitigating Phishing by a New ID-based Chameleon Hash without Key Exposure', Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007), Gold Coast, Australia, University of Queensland, pp. 1-13.
-
(2007)
Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCERT2007)
, pp. 1-13
-
-
Ren, Q.1
Mu, Y.2
Susilo, W.3
-
3
-
-
46749123455
-
SE-FAP: An Email System for Anti-Phishing
-
Melbourne, Australia, IEEE Press
-
Qiong Ren, Yi Mu, and Willy Susilo, (2007), 'SE-FAP: An Email System for Anti-Phishing', in The 6th IEEE International Conference on Computer and Information Science (ICIS 2007), Melbourne, Australia, IEEE Press, pp. 782-787.
-
(2007)
The 6th IEEE International Conference on Computer and Information Science (ICIS 2007)
, pp. 782-787
-
-
Ren, Q.1
Mu, Y.2
Susilo, S.3
-
4
-
-
84880883264
-
Improved Online/offline signature schemes
-
LNCS 2139, Springer-Verlag
-
A. Shamir and Y. Tauman, (2001), 'Improved Online/offline signature schemes', Advances in Cryptology-Crypto 2001, LNCS 2139, Springer-Verlag, pp. 355-367.
-
(2001)
Advances in Cryptology-Crypto 2001
, pp. 355-367
-
-
Shamir, A.1
Tauman, Y.2
-
5
-
-
38049075273
-
Efficient Generic Online/offline Signatures Without Key Exposure
-
5-8 June, 2007, Zhuhai, China, LNCS, Springer Verlag
-
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, and Yi Mu, (2007), 'Efficient Generic Online/offline Signatures Without Key Exposure', in 5th International Conference on Applied Cryptography and Network Security (ACNS'07), 5-8 June, 2007, Zhuhai, China, Vol. 4521, LNCS, Springer Verlag, pp. 18-30.
-
(2007)
5th International Conference on Applied Cryptography and Network Security (ACNS'07)
, vol.4521
, pp. 18-30
-
-
Chen, X.1
Zhang, F.2
Susilo, W.3
Mu, Y.4
-
6
-
-
0003260540
-
Simple Mail Transfer Protocol
-
Jonathan B. Postel. (1982), 'Simple Mail Transfer Protocol', RFC 821.
-
(1982)
RFC 821
-
-
Postel, J.B.1
-
7
-
-
33646758450
-
Deniable ring authentication revisited
-
LNCS
-
Willy Susilo and Yi Mu, (2004), 'Deniable ring authentication revisited', in Applied Cryptography and Network Security (ANCS) 04, Vol. 3089, LNCS, pp. 149-163.
-
(2004)
Applied Cryptography and Network Security (ANCS) 04
, vol.3089
, pp. 149-163
-
-
Susilo, W.1
Mu, Y.2
-
8
-
-
0000137257
-
Online/offline digital signatures
-
LNCS, Springer-Verlag
-
S. Even, O. Goldreich, and S. Micali, (1989), 'Online/offline digital signatures', in Advances in Cryptology-Crypto 1989, Vol. 2442, LNCS, Springer-Verlag, pp. 263-277.
-
(1989)
Advances in Cryptology-Crypto 1989
, vol.2442
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
9
-
-
34548344520
-
-
AntiPhishing Working Group, Available at
-
Anti-Phishing Working Group. Phishing activity trends report, (2006), Available at http://www.antiphishing.org.
-
(2006)
Phishing activity trends report
-
-
-
13
-
-
0031632567
-
Concurrent Zero-Knowledge
-
C. Dwork, M. Naor, and A. Sahai, (1998), ' Concurrent Zero-Knowledge', in Proc. 30th ACM Symposium on the Theory of Computing, pp. 409-418.
-
(1998)
Proc. 30th ACM Symposium on the Theory of Computing
, pp. 409-418
-
-
Dwork, C.1
Naor, M.2
Sahai, A.3
-
14
-
-
79960836060
-
Deniable Ring Authentication
-
M. Naor, (2002), 'Deniable Ring Authentication', Vol. 2442, Advances in Cryptology - Crypto 2002, Lecture Notes in Computer Science, pp. 481-498.
-
(2002)
Advances in Cryptology - Crypto 2002, Lecture Notes in Computer Science
, vol.2442
, pp. 481-498
-
-
Naor, M.1
-
15
-
-
35048828982
-
Chameleon hashing without key exposure
-
Springer-Verlag
-
X. Chen, F. Zhang, and K. Kim, (2004), 'Chameleon hashing without key exposure', 7th Information Security Conference (ISC 2004), Lecture Notes in Computer Science, Vol. 3225, Springer-Verlag, pp. 87-98.
-
(2004)
7th Information Security Conference (ISC 2004), Lecture Notes in Computer Science
, vol.3225
, pp. 87-98
-
-
Chen, X.1
Zhang, F.2
Kim, K.3
|