메뉴 건너뛰기




Volumn , Issue , 1999, Pages

Building intrusion tolerant applications

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 85084160265     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (73)

References (16)
  • 4
    • 0141911507 scopus 로고    scopus 로고
    • Multiplicative non-abelian sharing schemes and their application to threshold cryptography
    • Y. Desmedt, G. Di Crescenzo, M. Burmester, "Multiplicative non-abelian sharing schemes and their application to threshold cryptography", Proceedings ASIACRYPT '94, pp. 21-32.
    • Proceedings ASIACRYPT '94 , pp. 21-32
    • Desmedt, Y.1    Di Crescenzo, G.2    Burmester, M.3
  • 6
    • 0039241746 scopus 로고    scopus 로고
    • A practical protocol for large group oriented networks
    • Y. Frankel, "A practical protocol for large group oriented networks", Eurocrypt 89, pp. 56-61.
    • Eurocrypt , vol.89 , pp. 56-61
    • Frankel, Y.1
  • 11
    • 85077753331 scopus 로고    scopus 로고
    • Public Key Cryptography Standards (PKCS), RSA Labs, available at http://www.rsa.com/rsalabs/pubs/PKCS/
    • RSA Labs
  • 13
    • 0342779118 scopus 로고    scopus 로고
    • A simplified approach to threshold and proactive RSA
    • T. Rabin, "A simplified approach to threshold and proactive RSA", Proceedings of Crypto' 98.
    • Proceedings of Crypto' 98
    • Rabin, T.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret", Comm. of the ACM, Vol. 22, 1979, pp. 612-613.
    • (1979) Comm. Of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.