메뉴 건너뛰기




Volumn 1648, Issue , 1999, Pages 184-195

Anonymous authentication of membership in dynamic groups

Author keywords

Anonymity; Authentication; Identification; Key replacement; Verifiably common secret encoding

Indexed keywords

CHROMIUM COMPOUNDS; ENCODING (SYMBOLS); IDENTIFICATION (CONTROL SYSTEMS); PUBLIC KEY CRYPTOGRAPHY; SIGNAL ENCODING;

EID: 84956867779     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-48390-x_14     Document Type: Conference Paper
Times cited : (52)

References (19)
  • 1
    • 84956860489 scopus 로고    scopus 로고
    • Anonymizer, Inc
    • Anonymizer, Inc., http://www.anonymizer.com.
  • 2
    • 84949995981 scopus 로고    scopus 로고
    • An Efficient Probabilistic Public-Key Encryption Scheme which Hides All Partial Information
    • Springer-Verlag
    • M. Blum and S. Goldwasser, “An Efficient Probabilistic Public-Key Encryption Scheme which Hides All Partial Information,” Advances of Cryptology - CRYPTO '84 Proceedings, Springer-Verlag, pp. 289-299.
    • Advances of Cryptology - CRYPTO '84 Proceedings , pp. 289-299
    • Blum, M.1    Goldwasser, S.2
  • 4
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Feb
    • D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Communications of the ACM, v. 24, n. 2, Feb 1981, pp. 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 5
    • 0022145479 scopus 로고
    • Security without Identification: Card Computers to make Big Brother Obsolete
    • Oct
    • D. Chaum, “Security without Identification: Card Computers to make Big Brother Obsolete,” Communications of the ACM, v. 28, n. 10, Oct 1985, pp. 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 8
    • 0001494997 scopus 로고    scopus 로고
    • Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities
    • Autumn
    • D. Coppersmith, “Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities,” Journal of Cryptography, v. 10 n. 4, Autumn 1997, pp. 233-260.
    • (1997) Journal of Cryptography , vol.10 , Issue.4 , pp. 233-260
    • Coppersmith, D.1
  • 14
    • 0023985175 scopus 로고
    • Solving Simultaneous Modular Equations of Low Degree
    • Apr
    • J. Hastad, “Solving Simultaneous Modular Equations of Low Degree,” SIAM Journal on Computing, v. 17 no. 2, Apr 1988, pp. 336-341.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 336-341
    • Hastad, J.1
  • 17
    • 0003611111 scopus 로고    scopus 로고
    • Crowds: Anonymity for Web Transactions
    • Apr
    • M. Reiter and A. Rubin, “Crowds: Anonymity for Web Transactions” DIMACS Technical Report 97-15, Apr 1997.
    • (1997) DIMACS Technical Report , pp. 15-97
    • Reiter, M.1    Rubin, A.2
  • 19
    • 84956856161 scopus 로고    scopus 로고
    • The Wall Street Journal Online
    • The Wall Street Journal Online, http://www.wsj.com.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.