메뉴 건너뛰기




Volumn 1189, Issue , 1997, Pages 139-153

Key escrow in mutually mistrusting domains

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY;

EID: 84979022024     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-62494-5_14     Document Type: Conference Paper
Times cited : (20)

References (15)
  • 1
    • 0347227352 scopus 로고
    • FIPS Publication 185: Escrowed Encryption Standard. February
    • National Institute of Standards and Technology. FIPS Publication 185: Escrowed Encryption Standard. February 1994.
    • (1994) National Institute of Standards and Technology
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • June, Arlington, Va
    • G. R. Blakley. Safeguarding cryptographic keys. In the Proceedings of AFIPS 1979 NCC, Vol. 48, Arlington, Va., pages 313-317, June 1979.
    • (1979) The Proceedings of AFIPS 1979 NCC , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 3
    • 0029513859 scopus 로고
    • Key distribution without individual trusted authentication servers
    • IEEE Computer Society Press, Los Alamitos, California, June
    • L. Chen, D. Gollmann, and C. Mitchell. Key distribution without individual trusted authentication servers. In Proceedings: the 8th IEEE Computer Security Foundations Workshop, pages 30-36. IEEE Computer Society Press, Los Alamitos, California, June 1995.
    • (1995) Proceedings: The 8th IEEE Computer Security Foundations Workshop , pp. 30-36
    • Chen, L.1    Gollmann, D.2    Mitchell, C.3
  • 4
    • 0030107190 scopus 로고    scopus 로고
    • A taxonomy for key escrow encryption systems
    • D. E. Denning and D. K. Branstad. A taxonomy for key escrow encryption systems. Communications of the ACM. 39(3): 34-40, 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.3 , pp. 34-40
    • Denning, D.E.1    Branstad, D.K.2
  • 6
    • 84957693910 scopus 로고
    • Escrow encryption systems visited: Attacks, analysis and designs
    • D. Coppersmith, editor,. Springer-Verlag
    • Y. Frankel and M. Yung. Escrow encryption systems visited: attacks, analysis and designs. In D. Coppersmith, editor, Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95, pages 222-235. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95 , pp. 222-235
    • Frankel, Y.1    Yung, M.2
  • 7
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • L. Gong. Increasing availability and security of an authentication service. IEEE Journal on Selected Areas in Communications, 11: 657-662, 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , pp. 657-662
    • Gong, L.1
  • 11
    • 84957658795 scopus 로고
    • A simple method for generating and sharing pseudorandom functions, with applications to clipper-like key escrow systems
    • D. Coppersmith, editor,. Springer-Verlag
    • S. Micali and R. Sidney. A simple method for generating and sharing pseudorandom functions, with applications to clipper-like key escrow systems. In D. Coppersmith, editor, Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95, pages 185-196. Springer-Verlag, 1995.
    • (1995) Lecture Notes in Computer Science 963, Advances in Cryptology-CRYPTO '95 , pp. 185-196
    • Micali, S.1    Sidney, R.2
  • 12
    • 0030270929 scopus 로고    scopus 로고
    • A public-key based key escrow system
    • to appear October
    • J. Nechvatal. A public-key based key escrow system. Journal of Systems and Software, to appear October 1996.
    • (1996) Journal of Systems and Software
    • Nechvatal, J.1
  • 15


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.