메뉴 건너뛰기




Volumn , Issue , 2012, Pages

ANDaNA: Anonymous Named Data Networking Application

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 85010823713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (61)

References (44)
  • 6
    • 4043050062 scopus 로고    scopus 로고
    • Keyprivacy in public-key encryption
    • B. A., D. A., and
    • M. Bellare, B. A., D. A., and D. Pointcheval. Keyprivacy in public-key encryption. In ASIACRYPT, 2001.
    • (2001) ASIACRYPT
    • Bellare, M.1    Pointcheval, D.2
  • 7
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO, 1996.
    • (1996) CRYPTO
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 8
    • 0001229355 scopus 로고    scopus 로고
    • A forward-secure digital signature scheme
    • M. Bellare and S. Miner. A forward-secure digital signature scheme. In CRYPTO, 1999.
    • (1999) CRYPTO
    • Bellare, M.1    Miner, S.2
  • 9
    • 51249085821 scopus 로고    scopus 로고
    • Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
    • M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology, 21(4), 2008.
    • (2008) Journal of Cryptology , vol.21 , Issue.4
    • Bellare, M.1    Namprempre, C.2
  • 10
  • 13
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2
    • Chaum, D.1
  • 14
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10), 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10
    • Chaum, D.1
  • 38
    • 20444437836 scopus 로고    scopus 로고
    • Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
    • Washington, DC, USA
    • M. Rennhard and B. Plattner. Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection. In Workshop on Privacy in the Electronic Society, Washington, DC, USA, 2002.
    • (2002) Workshop on Privacy in the Electronic Society
    • Rennhard, M.1    Plattner, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.