메뉴 건너뛰기




Volumn 1172, Issue , 1996, Pages 48-55

Investigation of non-repudiation protocols

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 84947904138     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (19)
  • 3
    • 84961369151 scopus 로고
    • Security of Ramp Schemes
    • Springer-Verlag, Berlin, Heidelberg, 1984
    • Blakley, G. R. and Meadows, C. (1984): "Security of Ramp Schemes," Advances in Cryptology-Crypto '84, Springer-Verlag, Berlin, Heidelberg, 1984, pp. 242-268.
    • (1984) Advances in Cryptology-Crypto '84 , pp. 242-268
    • Blakley, G.R.1    Meadows, C.2
  • 7
    • 84874800178 scopus 로고
    • A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    • IT-31, July 1985
    • El Gamal, T. (1985): "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory, Vol. IT-31, № 4, July 1985, pp. 469-472.
    • (1985) IEEE Transactions on Information Theory , Issue.4 , pp. 469-472
    • El Gamal, T.1
  • 8
    • 0028498073 scopus 로고
    • Multistage Secret Sharing Based on One-way Function
    • September, 1994
    • He, J. and Dawson, E. (1994): "Multistage Secret Sharing Based on One-way Function," Electronics Letters, Vol. 30, № 19, September, 1994, pp. 1591-1592.
    • (1994) Electronics Letters , vol.30 , Issue.19 , pp. 1591-1592
    • He, J.1    Dawson, E.2
  • 9
    • 0029197220 scopus 로고
    • Multisecret-Sharing Scheme Based on One Way Function
    • January, 1995
    • He, J. and Dawson, E. (1995): "Multisecret-Sharing Scheme Based on One Way Function," Electronics Letters, Vol. 31, № 2, January, 1995, pp. 93-95.
    • (1995) Electronics Letters , vol.31 , Issue.2 , pp. 93-95
    • He, J.1    Dawson, E.2
  • 10
    • 0030195519 scopus 로고
    • An Efficient Dynamic Threshold Scheme
    • E79-D, 1996
    • Hwang, S. J., Chang, C. C. and Yang, W. P. (1995): "An Efficient Dynamic Threshold Scheme," IEICE TRANS. INF. & SYST., Vol. E79-D, № 7, 1996, pp. 936-942.
    • (1995) IEICE TRANS. INF. & SYST. , Issue.7 , pp. 936-942
    • Hwang, S.J.1    Chang, C.C.2    Yang, W.P.3
  • 12
    • 0003657590 scopus 로고
    • Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, Mass, 1981
    • Knuth, D. (1981): The Art of Computer Programming, Vol. 2: Seminumerical Algorithms, Second Edition, Addison-Wesley, Reading, Mass, 1981.
    • (1981) The Art of Computer Programming , vol.2
    • Knuth, D.1
  • 13
    • 38949129043 scopus 로고
    • Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space
    • Santa Barbara, California, U.S.A., August 1989
    • Laih, C., Ham, L., Lee, J. and Hwang, T. (1989): "Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space," Proceeding of Crypto '89, Santa Barbara, California, U.S.A., August 1989, pp. 20-24.
    • (1989) Proceeding of Crypto '89 , pp. 20-24
    • Laih, C.1    Ham, L.2    Lee, J.3    Hwang, T.4
  • 16
  • 17
    • 0028548565 scopus 로고
    • Construction of Dynamic Threshold Schemes
    • November, 1995
    • Sun H. M. and Shieh, S. P. (1994b): "Construction of Dynamic Threshold Schemes", Electronics Letters, Vol. 30, № 24, November, 1995, pp. 2023-2024
    • (1994) Electronics Letters , vol.30 , Issue.24 , pp. 2023-2024
    • Sun, H.M.1    Shieh, S.P.2
  • 18
    • 84935531957 scopus 로고
    • Relationship Between MDS Codes and Threshold Scheme
    • 1988
    • Xain, Y. Y. (1988): "Relationship Between MDS Codes and Threshold Scheme," Electronics Letters, Vol. 24, № 3, 1988, pp. 154-156.
    • (1988) Electronics Letters , vol.24 , Issue.3 , pp. 154-156
    • Xain, Y.Y.1
  • 19
    • 0027969713 scopus 로고
    • Reusing Shares in Secret Sharing Schemes
    • 1994
    • Zheng, Y., Hardjono, T. and Seberry, J. (1994): "Reusing Shares in Secret Sharing Schemes," The Computer Journal, Vol. 37, № 3, 1994, pp. 200-205.
    • (1994) The Computer Journal , vol.37 , Issue.3 , pp. 200-205
    • Zheng, Y.1    Hardjono, T.2    Seberry, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.