메뉴 건너뛰기




Volumn 1146, Issue , 1996, Pages 131-143

Server-supported signatures

Author keywords

Digital signatures; Distributed systems; Electronic commerce; Mobility; Network security; Non repudiation

Indexed keywords

AUTHENTICATION; CARRIER MOBILITY; DISTRIBUTED DATABASE SYSTEMS; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; HASH FUNCTIONS; SECURITY SYSTEMS;

EID: 84949757635     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-61770-1_32     Document Type: Conference Paper
Times cited : (23)

References (9)
  • 1
    • 0003628828 scopus 로고
    • Standard Protocols and Techniques. Prentice Hall, New Jersey
    • Warwick Ford. Computer Communications Security - Principles, Standard Protocols and Techniques. Prentice Hall, New Jersey, 1994.
    • (1994) Computer Communications Security - Principles
  • 2
    • 0025849585 scopus 로고
    • How to time-stamp a digital document
    • Stuart Haber and W. Scott Stornetta. How to time-stamp a digital document. Journal of Cryptology 3/2 (1991) 99-111.
    • (1991) Journal of Cryptology , vol.3 , Issue.2 , pp. 99-111
    • Haber, S.1    Scott Stornetta, W.2
  • 3
    • 84949897327 scopus 로고
    • Information Technology, SC 272nd ISO/IEC CD 13888- 1 Information Technology - Security Techniques - Non-repudiation - Part1: General Model. ISO/IEC JTC 1/SC 27 N 1105, May
    • ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888- 1 Information Technology - Security Techniques - Non-repudiation - Part1: General Model. ISO/IEC JTC 1/SC 27 N 1105, May 1995.
    • (1995)
  • 4
    • 84949897328 scopus 로고
    • Information Technology, SC 27. 2nd ISO/IEC CD 13888- 2 Information Technology - Security Techniques - Non-repudiation - Part2: Using symmetric encipherment algorithms. ISO/IEC JTC 1/SC 27 N 1106, July
    • ISO/IEC JTC1, Information Technology, SC 27. 2nd ISO/IEC CD 13888- 2 Information Technology - Security Techniques - Non-repudiation - Part2: Using symmetric encipherment algorithms. ISO/IEC JTC 1/SC 27 N 1106, July 1995.
    • (1995)
  • 5
    • 84949897329 scopus 로고
    • Information Technology, SC 27. ISO/IEC CD 13888-3 Information Technology - Security Techrfiques - Non-repudiation - Part3: Using asymmetric techniques. ISO/IEC JTC 1/SC 27 N 1107, September
    • ISO/IEC JTC1, Information Technology, SC 27. ISO/IEC CD 13888-3 Information Technology - Security Techrfiques - Non-repudiation - Part3: Using asymmetric techniques. ISO/IEC JTC 1/SC 27 N 1107, September 1995.
    • (1995)
  • 6
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • In Carl Pomerance, editor, Santa Barbara, CA, USA, August, Springer-Verlag, Berlin Germany
    • Ralph C. Merkle. A digital signature based on a conventional encryption function. In Carl Pomerance, editor, Advances in Cryptology - CRYPTO '87, number 293 in Lecture Notes in Computer Science, pages 369-378, Santa Barbara, CA, USA, August 1987. Springer-Verlag, Berlin Germany.
    • (1987) Advances in Cryptology - CRYPTO '87, Number 293 in Lecture Notes in Computer Science , pp. 369-378
    • Merkle, R.C.1
  • 9
    • 33747419291 scopus 로고    scopus 로고
    • Algorithms, and Source Code in C. John Wiley & Sons Inc., New York, second edition
    • Bruce Schaeier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons Inc., New York, second edition, 1996.
    • (1996) Applied Cryptography: Protocols
    • Schaeier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.