메뉴 건너뛰기




Volumn 10, Issue 1, 1994, Pages 59-71

Providing auditing while protecting privacy

Author keywords

Additive homomorphisms; Applications of number theory; Authentication; Computers and society; Cryptography; Privacy; Secret sharing; Security and protection

Indexed keywords


EID: 84952535645     PISSN: 01972243     EISSN: 10876537     Source Type: Journal    
DOI: 10.1080/01972243.1994.9960157     Document Type: Article
Times cited : (2)

References (26)
  • 1
    • 84936897769 scopus 로고
    • Carnegie Mellon University Mercury Technical Report Series. Pittsburgh, PA: Carnegie Mellon University
    • Arms, W. et al. 1992. The Mercury Electronic Library and Library Information System II. Carnegie Mellon University Mercury Technical Report Series. Pittsburgh, PA: Carnegie Mellon University.
    • (1992) The Mercury Electronic Library and Library Information System II
    • Arms, W.1
  • 2
    • 0041450577 scopus 로고
    • Crime and Puzzlement
    • fall
    • Barlow, J. 1990. Crime and Puzzlement. Whole Earth Review (fall):45-56.
    • (1990) Whole Earth Review , pp. 45-56
    • Barlow, J.1
  • 3
    • 0003945449 scopus 로고
    • Dissertation, Department of Computer Science, Yale University, New Haven, CT
    • Benaloh, J. 1987. Verifiable Secret-Ballot Elections, Dissertation, Department of Computer Science, Yale University, New Haven, CT.
    • (1987) Verifiable Secret-Ballot Elections
    • Benaloh, J.1
  • 6
    • 0018443381 scopus 로고
    • Privacy and Authentication: An Introduction to Cryptography
    • Diffie, W., and M. E. Heilman. 1979. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE. 67:18-48.
    • (1979) Proceedings of the IEEE , vol.67 , pp. 18-48
    • Diffie, W.1    Heilman, M.E.2
  • 9
    • 84952539564 scopus 로고
    • How to Make Replicated Data Secure
    • In C. Pomerance (Ed.), Berlin: Springer-Verlag
    • Herlihy, M. P., and J. D. Tygar. 1987. How to Make Replicated Data Secure. In C. Pomerance (Ed.), Advances in Cryptography-CRYPTO 87. Berlin: Springer-Verlag.
    • (1987) Advances in Cryptography-Crypto , pp. 87
    • Herlihy, M.P.1    Tygar, J.D.2
  • 10
    • 84952566780 scopus 로고
    • Implementing Distributed Capacities without a Trusted Kernel
    • In A. Avizienis and J. C. Caprie (Eds.), Berlin: Springer-Verlag
    • Herlihy, M. P., and J. D. Tygar. 1991. Implementing Distributed Capacities without a Trusted Kernel. In A. Avizienis and J. C. Caprie (Eds.), Dependable Computing for Critical Applications. Berlin: Springer-Verlag.
    • (1991) Dependable Computing for Critical Applications
    • Herlihy, M.P.1    Tygar, J.D.2
  • 12
    • 14944366867 scopus 로고
    • A More Cooperative Clerk: The Confidentiality of the Library Record
    • Johnson, B. S. 1989. A More Cooperative Clerk: The Confidentiality of the Library Record. Law Library Journal. 81:769-803.
    • (1989) Law Library Journal , vol.81 , pp. 769-803
    • Johnson, B.S.1
  • 13
    • 0010814656 scopus 로고
    • Chapter 9: The Iron Fist and the Velvet Glove
    • In J. E. Short (Ed.), Beverly Hills, CA: Sage
    • Marx, G. 1986. Chapter 9: The Iron Fist and the Velvet Glove. In J. E. Short (Ed.), The Social Fabric: Dimensions and Issues, (chap. 9, pp. 135-162). Beverly Hills, CA: Sage.
    • (1986) The Social Fabric: Dimensions and Issues , vol.9 , pp. 135-162
    • Marx, G.1
  • 14
  • 15
    • 84947965807 scopus 로고
    • Fair Public-Key Cryptosystems. Preliminary draft
    • Massachusetts Institute of Technology, Cambridge
    • Micali, S. 1993. Fair Public-Key Cryptosystems. Preliminary draft, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge.
    • (1993) Laboratory for Computer Science
    • Micali, S.1
  • 16
    • 84952566781 scopus 로고
    • Federal Information Processing Publication 46: Specifications for the Digital Encryption Standard
    • In D. W. Davies (Ed.), Los Angeles, CA: IEEE Computer Society Press
    • National Bureau of Standards. 1977. Federal Information Processing Publication 46: Specifications for the Digital Encryption Standard. In D. W. Davies (Ed.), The Security of Data in Networks (pp. 64-74). Los Angeles, CA: IEEE Computer Society Press.
    • (1977) The Security of Data in Networks , pp. 64-74
  • 17
    • 0003429521 scopus 로고
    • Cambridge, MA: Harvard University Press
    • Pool, I. S. 1983. Technologies of Freedom. Cambridge, MA: Harvard University Press.
    • (1983) Technologies of Freedom
    • Pool, I.S.1
  • 20
    • 0020926374 scopus 로고
    • Proceedings, Third Symposium on Reliability in Distributed Software and Database Systems
    • Randell, B. 1983. Recursively Structured Distributed Computing Systems. Proceedings, Third Symposium on Reliability in Distributed Software and Database Systems.
    • (1983) Recursively Structured Distributed Computing Systems
    • Randell, B.1
  • 22
    • 0017930809 scopus 로고
    • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
    • Rivest, R. L., A. Shamir, and L. Adleman. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. 21:158-164.
    • (1978) Communications of the ACM , vol.21 , pp. 158-164
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 25
    • 77950592956 scopus 로고
    • Strongbox: A System for Self Securing Programs
    • In R. Rashid (Ed.), New York: Addison-Wesley and ACM Press
    • Tygar, J. D., and B. Yee. 1991a. Strongbox: A System for Self Securing Programs. In R. Rashid (Ed.), CMU Computer Science: A 25th Anniversary Commemorative (pp. 163-198). New York: Addison-Wesley and ACM Press.
    • (1991) CMU Computer Science: A 25Th Anniversary Commemorative , pp. 163-198
    • Tygar, J.D.1    Yee, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.