메뉴 건너뛰기




Volumn , Issue , 2007, Pages 213-224

A new model for public-key authentication

Author keywords

[No Author keywords available]

Indexed keywords

FORMAL LANGUAGES; PUBLIC KEY CRYPTOGRAPHY;

EID: 84879862445     PISSN: 1431472X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-69962-0_18     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 2
    • 84976766949 scopus 로고
    • The entity-relationship model: Toward a unified view of data
    • Peter Pin-Shan S. Chen. The entity-relationship model: Toward a unified view of data. ACM Transactions on Database Systems, 1(1):9-36, 1976.
    • (1976) ACM Transactions on Database Systems , vol.1 , Issue.1 , pp. 9-36
    • Pin-Shan, P.1    Chen, S.2
  • 4
    • 0025023289 scopus 로고
    • Reasoning about belief in cryptographic protocols
    • Deborah Cooper and Teresa Lunt, editors IEEE Computer Society
    • Li Gong, Roger Needham, and Raphael Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
    • (1990) Proceedings 1990 IEEE Symposium on Research in Security and Privacy , pp. 234-248
    • Gong, L.1    Needham, R.2    Yahalom, R.3
  • 5
    • 10844288659 scopus 로고    scopus 로고
    • Using probabilistic argumentation for key validation in public-key cryptography
    • R. Haenni. Using probabilistic argumentation for key validation in public-key cryptography. International Journal of Approximate Reasoning, 38(3):355-376, 2005.
    • (2005) International Journal of Approximate Reasoning , vol.38 , Issue.3 , pp. 355-376
    • Haenni, R.1
  • 6
    • 84883293902 scopus 로고    scopus 로고
    • Credential networks: A general model for distributed trust and authenticity management
    • A. Ghorbani and S. Marsh, editors St. Andrews, Canada
    • J. Jonczy and R. Haenni. Credential networks: a general model for distributed trust and authenticity management. In A. Ghorbani and S. Marsh, editors, PST'05: 3rd Annual Conference on Privacy, Security and Trust, pages 101-112, St. Andrews, Canada, 2005.
    • (2005) PST'05: 3rd Annual Conference on Privacy, Security and Trust , pp. 101-112
    • Jonczy, J.1    Haenni, R.2
  • 8
    • 22644449732 scopus 로고    scopus 로고
    • Reasoning about public-key certification: On bindings between entities and public keys
    • M. K. Franklin, editor LNCS 1648 Anguilla, British West Indies Springer
    • R. Kohlas and U. Maurer. Reasoning about public-key certification: On bindings between entities and public keys. In M. K. Franklin, editor, Financial Cryptography'99, Third International Conference, LNCS 1648, pages 86-103, Anguilla, British West Indies, 1999. Springer.
    • (1999) Financial Cryptography'99, Third International Conference , pp. 86-103
    • Kohlas, R.1    Maurer, U.2
  • 9
    • 84957803553 scopus 로고    scopus 로고
    • Confidence valuation in a public-key infrastructure based on uncertain evidence
    • H. Imai and Y. Zheng, editors LNCS 1751 Melbourne, Australia Springer
    • R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In H. Imai and Y. Zheng, editors, PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography, LNCS 1751, pages 93-112, Melbourne, Australia, 2000. Springer.
    • (2000) PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography , pp. 93-112
    • Kohlas, R.1    Maurer, U.2
  • 10
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors LNCS 1146 Springer
    • U. Maurer. Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pages 324-350. Springer, 1996.
    • (1996) ESORICS, European Symposium on Research in Computer Security , pp. 324-350
    • Maurer, U.1
  • 13
    • 0043126255 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Cambridge, USA
    • R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.
    • (1977) Technical Report TM-82, MIT
    • Rivest, R.L.1    Shamir, A.2    Adelman, L.M.3
  • 16
    • 77957184777 scopus 로고
    • Many-sorted first-order logic database language
    • J. S. II. Yang, Y. H. Chin, and C. G. Chung. Many-sorted first-order logic database language. Comput. J., 35(2):129-137, 1992.
    • (1992) Comput. J. , vol.35 , Issue.2 , pp. 129-137
    • Yang II, J.S.1    Chin, Y.H.2    Chung, C.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.