메뉴 건너뛰기




Volumn 9, Issue 2, 2013, Pages 247-258

A secure network for mobile wireless service

Author keywords

Mobile wireless network; Security

Indexed keywords

BLIND SIGNATURES; CRYPTOGRAPHIC TECHNIQUES; MOBILE WIRELESS; MOBILE WIRELESS NETWORK; NETWORK SERVICES; PRACTICAL NETWORKS; SECURE NETWORKS; SECURITY;

EID: 84883040938     PISSN: 1976913X     EISSN: 2092805X     Source Type: Journal    
DOI: 10.3745/JIPS.2013.9.2.247     Document Type: Article
Times cited : (36)

References (33)
  • 1
    • 84937409147 scopus 로고    scopus 로고
    • Remarks on mix-network based on permutation networks
    • In PKC '01
    • M Abe and F Hoshino. Remarks on mix-network based on permutation networks. In PKC '01, pp.317-324.
    • Abe, M.1    Hoshino, F.2
  • 2
    • 84958744427 scopus 로고    scopus 로고
    • 1-out-of-n signatures from a variety of keys
    • In ASIACRYPT '02
    • M Abe, M Ohkubo, and K Suzuki. 1-out-of-n signatures from a variety of keys. In ASIACRYPT '02, pp.415-432.
    • Abe, M.1    Ohkubo, M.2    Suzuki, K.3
  • 4
    • 35048870073 scopus 로고    scopus 로고
    • Cryptographic protocols for secure second-price auctions
    • Available at
    • F Brandt. Cryptographic protocols for secure second-price auctions. 2001. Available at http://www. brauer.in.tum.de/ brandtf/papers/cia2001.pdf
    • (2001)
    • Brandt, F.1
  • 5
    • 33745174191 scopus 로고    scopus 로고
    • A formal treatment of onion routing
    • In CRYPTO '05, of Lecture Notes in Computer Science, Berlin, Springer-Verlag
    • J Camenisch and A Mityagin. A formal treatment of onion routing. In CRYPTO '05, Vol.3089 of Lecture Notes in Computer Science, pp.169-187, Berlin, 2005. Springer-Verlag.
    • (2005) , vol.3089 , pp. 169-187
    • Camenisch, J.1    Mityagin, A.2
  • 6
    • 0001604533 scopus 로고    scopus 로고
    • Blind signatures for untraceable payments
    • In CRYPTO '82
    • D Chaum. Blind signatures for untraceable payments. In CRYPTO '82, pp.199-204.
    • Chaum, D.1
  • 7
    • 0022145479 scopus 로고    scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • In Communications of the ACM
    • D Chaum. Security without identification: transaction systems to make big brother obsolete. In Communications of the ACM, 28 (1985), pp.1030-1044.
    • , vol.28 , Issue.1985 , pp. 1030-1044
    • Chaum, D.1
  • 8
    • 84882936099 scopus 로고    scopus 로고
    • Blinding for unanticipated signatures
    • In EUROCRYPT '87
    • D Chaum. Blinding for unanticipated signatures. In EUROCRYPT '87, pp.227-236.
    • Chaum, D.1
  • 9
    • 35048835189 scopus 로고    scopus 로고
    • Untraceable electronic cash
    • In Crypto '88
    • D Chaum, A Fiat and M Naor. Untraceable electronic cash. In Crypto '88, pp.319-327.
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 10
    • 0000969676 scopus 로고    scopus 로고
    • Elections with unconditionally-secret ballots and disruption equivalent to breaking rsa
    • In Eurocrypt '88
    • D Chaum. Elections with unconditionally-secret ballots and disruption equivalent to breaking rsa. In Eurocrypt '88, pp.177-182.
    • Chaum, D.1
  • 11
    • 85001025766 scopus 로고    scopus 로고
    • Wallet databases with observers
    • In CRYPTO '92
    • D Chaum and T Pedersen. Wallet databases with observers. In CRYPTO '92, pp.89-105.
    • Chaum, D.1    Pedersen, T.2
  • 12
    • 84947288202 scopus 로고    scopus 로고
    • Efficient sealed-bid auctions for massive numbers of bidders with lump comparison
    • In Information Security, 4th International Conference, ISC
    • K Chida, K Kobayashi, and H Morita. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. In Information Security, 4th International Conference, ISC 2001, pp.408-419.
    • (2001) , pp. 408-419
    • Chida, K.1    Kobayashi, K.2    Morita, H.3
  • 14
    • 84880857711 scopus 로고    scopus 로고
    • An efficient scheme for proving a shuffle
    • In CRYPTO '01
    • J Furukawa and K Sako. An efficient scheme for proving a shuffle. In CRYPTO '01, pp.368-387.
    • Furukawa, J.1    Sako, K.2
  • 15
    • 0023545076 scopus 로고
    • How to play any mental game or a completeness theorem for protocols with honest majority
    • In Proceedings of the Nineteenth Annual ACM Symposi-um on Theory of Computing, STOC 1987
    • Oded Goldreich, Silvio Micali, and Avi Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In Proceedings of the Nineteenth Annual ACM Symposi-um on Theory of Computing, STOC 1987, pp.218-229, 1987.
    • (1987) , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 16
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing for anonymous and private internet connections. Comm. of the ACM, 42(2), pp.84-88, 1999.
    • (1999) Comm. of the ACM , vol.42 , Issue.2 , pp. 84-88
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 17
    • 35248822599 scopus 로고    scopus 로고
    • A verifiable secret shuffle of homomorphic encryptions
    • J Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography 2003, pp.145-160.
    • (2003) In Public Key Cryptography , pp. 145-160
    • Groth, J.1
  • 18
    • 27544495621 scopus 로고    scopus 로고
    • Efficient and verifiable shuffling and shuffle-decryption
    • In IEICE Transactions
    • J Furukawa. Efficient and verifiable shuffling and shuffle-decryption. In IEICE Transactions 88-A(1), pp.172-188, 2005.
    • (2005) , vol.88 A , Issue.1 , pp. 172-188
    • Furukawa, J.1
  • 19
    • 31144445731 scopus 로고    scopus 로고
    • Technical challenges of network anonymity
    • 1 February
    • D Kesdogana and C Palme. Technical challenges of network anonymity. In Computer Communica-tions, Vol.29, Issue 3, 1 February 2006, pp.306-324.
    • (2006) In Computer Communica-tions , vol.29 , Issue.3 , pp. 306-324
    • Kesdogana, D.1    Palme, C.2
  • 20
    • 0002400630 scopus 로고    scopus 로고
    • Multi-round anonymous auction
    • In IEEE Workshop on De-pendable and Real-Time E-Commerce Systems
    • H Kikuchi, M Harkavy, and J Tygar. Multi-round anonymous auction. In IEEE Workshop on De-pendable and Real-Time E-Commerce Systems 1998, pp.62-69.
    • (1998) , pp. 62-69
    • Kikuchi, H.1    Harkavy, M.2    Tygar, J.3
  • 21
    • 0842339416 scopus 로고    scopus 로고
    • (m+1)st-price auction
    • In FC '01
    • H Kikuchi. (m+1)st-price auction. In FC '01, 291-298.
    • Kikuchi, H.1
  • 22
    • 84961626294 scopus 로고    scopus 로고
    • Distributed auction servers resolving winner and win-ning bid without revealing privacy of bids
    • In NGITA '00
    • H Kikuchi, S Hotta, K Abe, and S Nakanishi. Distributed auction servers resolving winner and win-ning bid without revealing privacy of bids. In NGITA '00, pp.307-312.
    • Kikuchi, H.1    Hotta, S.2    Abe, K.3    Nakanishi, S.4
  • 23
    • 0035754862 scopus 로고    scopus 로고
    • A verifiable secret shuffle and its application to e-voting
    • In ACM CCS '01
    • C Neff. A verifiable secret shuffle and its application to e-voting. In ACM CCS '01, pp.116-125, 2001.
    • (2001) , pp. 116-125
    • Neff, C.1
  • 24
    • 79952047267 scopus 로고    scopus 로고
    • Verifiable mixing (shuffling) of elgamal pairs
    • Available as
    • C Neff. Verifiable mixing (shuffling) of elgamal pairs. 2004. Available as http://theory.lcs.mit.edu/ rivest/voting/papers/Neff-2004-04-21-ElGamalShuffles.pdf.
    • (2004)
    • Neff, C.1
  • 25
    • 84957024214 scopus 로고    scopus 로고
    • A second-price sealed-bid auction with the discriminant of the p-th root
    • In FC '02
    • K Omote and A Miyaji. A second-price sealed-bid auction with the discriminant of the p-th root. In FC '02, pp.57-71.
    • Omote, K.1    Miyaji, A.2
  • 26
    • 33745162938 scopus 로고    scopus 로고
    • Simple and efficient shuffling with provable correctness and ZK privacy
    • In CRYPTO '05
    • K Peng, C Boyd, and E Dawson. Simple and efficient shuffling with provable correctness and ZK privacy. In CRYPTO '05, pp.188-204.
    • Peng, K.1    Boyd, C.2    Dawson, E.3
  • 27
    • 84944045443 scopus 로고    scopus 로고
    • Robust, privacy protecting and publicly verifiable sealed-bid auction
    • In ICICS '02
    • K Peng, C Boyd, E Dawson, and K Viswanathan. Robust, privacy protecting and publicly verifiable sealed-bid auction. In ICICS '02, pp.147-159.
    • Peng, K.1    Boyd, C.2    Dawson, E.3    Viswanathan, K.4
  • 28
    • 35048899692 scopus 로고    scopus 로고
    • A correct, private and efficient mix network
    • In PKC '04
    • K Peng, C Boyd, E Dawson, and K Viswanathan. A correct, private and efficient mix network. In PKC '04, pp.439-454.
    • Peng, K.1    Boyd, C.2    Dawson, E.3    Viswanathan, K.4
  • 29
    • 78049405706 scopus 로고    scopus 로고
    • Efficiency improvement of homomorphic e-auction
    • In TRUSTBUS '10
    • K Peng and F Bao. Efficiency improvement of homomorphic e-auction. In TRUSTBUS '10, pp.238-249.
    • Peng, K.1    Bao, F.2
  • 30
    • 78751649436 scopus 로고    scopus 로고
    • Modification and optimisation of a shuffling scheme: stronger securi-ty, formal analysis and higher efficiency
    • In International Journal of Information Security
    • K Peng, E Dawson, and F Bao. Modification and optimisation of a shuffling scheme: stronger securi-ty, formal analysis and higher efficiency. In International Journal of Information Security, 2011 Vol.10, No.1, pp.33-47.
    • (2011) , vol.10 , Issue.1 , pp. 33-47
    • Peng, K.1    Dawson, E.2    Bao, F.3
  • 31
    • 79958782196 scopus 로고    scopus 로고
    • Secure E-auction for mobile users with low-capability devices in wireless network
    • In WISTP '11
    • K Peng. Secure E-auction for mobile users with low-capability devices in wireless network. In WISTP '11, pp.351-360.
    • Peng, K.1
  • 32
    • 85025166570 scopus 로고    scopus 로고
    • A Secure Mix Network with an Efficient Validity Verification Mechanism
    • In IDCS '12
    • K Peng and Y Zhang. A Secure Mix Network with an Efficient Validity Verification Mechanism. In IDCS '12, pp.85-96.
    • Peng, K.1    Zhang, Y.2
  • 33
    • 84894090297 scopus 로고    scopus 로고
    • Efficient homomorphic sealed-bid auction free of bid validity check and equality test
    • In Security and Communication Networks. Available online MAY at DOI: 10.1002/sec.549
    • K Peng. Efficient homomorphic sealed-bid auction free of bid validity check and equality test. In Security and Communication Networks. Available online MAY 2012 at DOI: 10.1002/sec.549.
    • (2012)
    • Peng, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.