메뉴 건너뛰기




Volumn 1716, Issue , 1999, Pages 274-287

Secure communication in an unknown network using certificates

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; SECURE COMMUNICATION;

EID: 84956862121     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-48000-6_22     Document Type: Conference Paper
Times cited : (18)

References (23)
  • 1
    • 84898960610 scopus 로고
    • Completeness theorems for non-cryptographic fault-tolerant distributed computation
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proceedings of the twentieth annual ACM Symp. Theory of Computing, STOC (May 2–4, 1988) pp. 1–10
    • (1988) Theory of Computing , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 3
    • 9744259321 scopus 로고
    • In Computer Security—ESORICS 94 (Lecture Notes in Computer Science 875)
    • Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In Computer Security—ESORICS 94 (Lecture Notes in Computer Science 875) (1994) Springer-Verlag pp. 3–18 275
    • (1994) Valuation of Trust in Open Networks , pp. 3-18
    • Beth, T.1    Borcherdingklein, M.2
  • 7
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • Dolev, D.: The Byzantine generals strike again. Journal of Algorithms 3 (1982) 14–30
    • (1982) Journal of Algorithms , vol.3 , pp. 14-30
    • Dolev, D.1
  • 9
    • 84956864812 scopus 로고
    • Graph algorithms. Computer science press Rockville
    • Even, S.: Graph algorithms. Computer science press Rockville, Maryland 1979
    • (1979) Maryland
    • Even, S.1
  • 10
    • 84957653101 scopus 로고    scopus 로고
    • In Advances in Cryptology — Eurocrypt’98, Proceedings (Lecture Notes in Computer Science 1403) (
    • Franklin, M., Wright, R.: Secure communication in minimal connectivity models. In Advances in Cryptology — Eurocrypt’98, Proceedings (Lecture Notes in Computer Science 1403) (1998) K. Nyberg, Ed. Springer-Verlag pp. 346–360
    • (1998) Secure Communication in Minimal Connectivity Models , pp. 346-360
    • Franklin, M.1    Wright, R.2
  • 12
    • 1542674248 scopus 로고    scopus 로고
    • Fault-tolerant computation in the full information model
    • Goldreich, O., Goldwasser, S., Linial, N.: Fault-tolerant computation in the full information model. SIAM J. Comput. 27 (1998) 506–544
    • (1998) SIAM J. Comput , vol.27 , pp. 506-544
    • Goldreich, O.1    Goldwasser, S.2    Linial, N.3
  • 17
    • 84947294004 scopus 로고    scopus 로고
    • In Computer Security— ESORICS 96 (Lecture Notes in Computer Science
    • Maurer, U.: Modeling public-key infrastructure. In Computer Security— ESORICS 96 (Lecture Notes in Computer Science 1146) (1996) Springer-Verlag pp. 325–350 275
    • (1996) Modeling Public-Key Infrastructure , pp. 325-350
    • Maurer, U.1
  • 18
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of ACM 27 (1980) 228–234
    • (1980) Journal of ACM , vol.27 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 19
    • 0018683804 scopus 로고
    • Encryption and secure computer networks
    • Popek, G. J., Kline, C. S.: Encryption and secure computer networks. ACM Computing Surveys 11 (1979) 335–356
    • (1979) ACM Computing Surveys , vol.11 , pp. 335-356
    • Popek, G.J.1    Kline, C.S.2
  • 22
    • 24944432519 scopus 로고    scopus 로고
    • Advances in Cryptology — Eurocrypt’99, Proceedings (Lecture Notes in Computer Science 1592) (1999) J. Stern, Ed
    • Wang, Y., Desmedt, Y.: Secure communication in broadcast channels. In Advances in Cryptology — Eurocrypt’99, Proceedings (Lecture Notes in Computer Science 1592) (1999) J. Stern, Ed. Springer-Verlag pp. 446–458
    • Secure Communication in Broadcast Channels , vol.446-458
    • Wang, Y.1    Desmedt, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.