-
3
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1-30 (2006)
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
4
-
-
84957718934
-
Divertible Protocols and Atomic Proxy Cryptography
-
Nyberg, K. (ed.) EUROCRYPT 1998. Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.J.3
-
5
-
-
85032883059
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
El Gamal, T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 10-18
-
-
El Gamal, T.1
-
6
-
-
77953963918
-
Privacy-preserving DRM
-
ACM, New York
-
Perlman, R., Kaufman, C., Perlner, R.: Privacy-preserving DRM. In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010, pp. 69-83. ACM, New York (2010)
-
(2010)
Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010
, pp. 69-83
-
-
Perlman, R.1
Kaufman, C.2
Perlner, R.3
-
7
-
-
33750274436
-
Privacy-Preserving Digital Rights Management
-
Jonker, W., Petković, M. (eds.) SDM 2004. Springer, Heidelberg
-
Conrado, C., Petković, M., Jonker, W.: Privacy-Preserving Digital Rights Management. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 83-99. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3178
, pp. 83-99
-
-
Conrado, C.1
Petković, M.2
Jonker, W.3
-
9
-
-
77956503709
-
A secure and mutual-profitable DRM interoperability scheme
-
IEEE Computer Society, Washington, DC
-
Lee, S., Park, H., Kim, J.: A secure and mutual-profitable DRM interoperability scheme. In: Proceedings of the IEEE Symposium on Computers and Communications, ISCC 2010, pp. 75-80. IEEE Computer Society, Washington, DC (2010)
-
(2010)
Proceedings of the IEEE Symposium on Computers and Communications, ISCC 2010
, pp. 75-80
-
-
Lee, S.1
Park, H.2
Kim, J.3
-
10
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. of Computing 32(3), 586-615 (2003)
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
12
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28, 1030-1044 (1985)
-
(1985)
Commun. ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
14
-
-
33847753565
-
-
Internet Engineering Task Force (IETF): Version 1.2 August RFC 5246
-
Internet Engineering Task Force (IETF): The Transport Layer Security (TLS) Protocol, Version 1.2 (August 2008); RFC 5246
-
(2008)
The Transport Layer Security (TLS) Protocol
-
-
-
17
-
-
85084161366
-
TOR: The second-generation onion router
-
USENIX Association, Berkeley
-
Dingledine, R., Mathewson, N., Syverson, P.: TOR: the second-generation onion router. In: Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004, vol. 13, p. 21. USENIX Association, Berkeley (2004)
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium, SSYM 2004
, vol.13
, pp. 21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
|