-
1
-
-
33745218758
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
9: 1-30, February
-
G. Ateniese, K. Fu, M. Green, and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur., 9: 1-30, February 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
3
-
-
0242472803
-
Digital rights management-technological, economic, legal and political aspects
-
Springer
-
E. Becker, W. Buhse, D. G̈unnewig, and N. Rump, editors. Digital Rights Management-Technological, Economic, Legal and Political Aspects, volume 2770 of Lecture Notes in Computer Science. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2770
-
-
Becker, E.1
Buhse, W.2
Gunnewig, D.3
Rump, N.4
-
4
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28: 1030-1044, Oct. 1985.
-
(1985)
Commun. ACM
, vol.28
, pp. 1030-1044
-
-
Chaum, D.1
-
5
-
-
85024290278
-
Group signatures
-
Berlin, Heidelberg,. Springer-Verlag
-
D. Chaum and E. Van Heyst. Group signatures. In Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques, EUROCRYPT'91, pages 257-265, Berlin, Heidelberg, 1991. Springer-Verlag.
-
(1991)
Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT'91
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
6
-
-
2642567004
-
Drm and privacy
-
Georgetown Public Law Research Paper No. 372741
-
J. E. Cohen. DRM AND PRIVACY. Berkeley Technology Law Journal, 18: 575-617, 2003. Georgetown Public Law Research Paper No. 372741.
-
(2003)
Berkeley Technology Law Journal
, vol.18
, pp. 575-617
-
-
Cohen, J.E.1
-
7
-
-
78650035684
-
Privacy in an identity-based drm system
-
Washington, DC, USA,. IEEE Computer Society
-
C. Conrado, F. Kamperman, G. J. Schrijen, and W. Jonker. Privacy in an Identity-based DRM System. In Proceedings of the 14th International Workshop on Database and Expert Systems Applications, DEXA '03, pages 389-395, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
Proceedings of the 14th International Workshop on Database and Expert Systems Applications, DEXA '03
, pp. 389-395
-
-
Conrado, C.1
Kamperman, F.2
Schrijen, G.J.3
Jonker, W.4
-
8
-
-
33750274436
-
Privacy-preserving digital rights management
-
Springer
-
C. Conrado, M. Petkovic, and W. Jonker. Privacy-preserving digital rights management. In Secure Data Management, volume 3178 of Lecture Notes in Computer Science, pages 83-99. Springer, 2004.
-
(2004)
Secure Data Management, Volume 3178 of Lecture Notes in Computer Science
, pp. 83-99
-
-
Conrado, C.1
Petkovic, M.2
Jonker, W.3
-
9
-
-
85084161366
-
Tor: The secondgeneration onion router
-
Berkeley, CA, USA,. USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: the secondgeneration onion router. In Proceedings of the 13th Conference on USENIX Security Symposium-Volume 13, SSYM'04, pages 21-21, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium-Volume 13, SSYM'04
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
10
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
New York, NY, USA,. Springer-Verlag
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Proceedings of CRYPTO 84 on Advances in cryptology, pages 10-18, New York, NY, USA, 1985. Springer-Verlag.
-
(1985)
Proceedings of CRYPTO 84 on Advances in Cryptology
, pp. 10-18
-
-
Elgamal, T.1
-
11
-
-
84959058818
-
Privacy engineering for digital rights management systems
-
London, UK, UK,. Springer-Verlag
-
J. Feigenbaum, M. J. Freedman, T. Sander, and A. Shostack. Privacy engineering for digital rights management systems. In Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, DRM '01, pages 76-105, London, UK, UK, 2002. Springer-Verlag.
-
(2002)
Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management, DRM '01
, pp. 76-105
-
-
Feigenbaum, J.1
Freedman, M.J.2
Sander, T.3
Shostack, A.4
-
12
-
-
84875997841
-
-
In Becker et al
-
S. Guth. A sample DRM system. In Becker et al. 3 , pages 150-161.
-
A Sample DRM System
, vol.3
, pp. 150-161
-
-
Guth, S.1
-
15
-
-
77956503709
-
A secure and mutual-profitable DRM interoperability scheme
-
Washington, DC, USA,. IEEE Computer Society
-
S. Lee, H. Park, and J. Kim. A secure and mutual-profitable DRM interoperability scheme. In Proceedings of the The IEEE Symposium on Computers and Communications, ISCC '10, pages 75-80, Washington, DC, USA, 2010. IEEE Computer Society.
-
(2010)
Proceedings of the the IEEE Symposium on Computers and Communications, ISCC '10
, pp. 75-80
-
-
Lee, S.1
Park, H.2
Kim, J.3
-
16
-
-
77953963918
-
Privacy-preserving DRM
-
New York, NY, USA,. ACM
-
R. Perlman, C. Kaufman, and R. Perlner. Privacy-preserving DRM. In Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST '10, pages 69-83, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST '10
, pp. 69-83
-
-
Perlman, R.1
Kaufman, C.2
Perlner, R.3
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21: 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
84946833891
-
How to leak a secret
-
London, UK,. Springer-Verlag
-
R. L. Rivest, A. Shamir, and Y. Tauman. How to leak a secret. In Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '01, pages 552-565, London, UK, 2001. Springer-Verlag.
-
(2001)
Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, ASIACRYPT '01
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
21
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir. How to share a secret. Commun. ACM, 22(11): 612-613, Nov. 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
18744410086
-
Receiver anonymity via incomparable public keys
-
New York, NY, USA,. ACM
-
B. R. Waters, E. W. Felten, and A. Sahai. Receiver anonymity via incomparable public keys. In Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, pages 112-121, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 112-121
-
-
Waters, B.R.1
Felten, E.W.2
Sahai, A.3
|