An efficient software-based security acceleration methods for open LBS services
暂无分享,去创建一个
Namje Park | Kiyoung Moon | Sungwon Sohn | Howon Kim | Kyoil Chung | Namje Park | Howon Kim | Kiyoung Moon | S. Sohn | Kyoil Chung
[1] Nam-Je Park,et al. XML Key Information System for Secure e-Trading , 2003 .
[2] Marco Prandini,et al. A novel approach to on-line status authentication of public-key certificates , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[3] Jeongho Lee,et al. A Scalable Structure for a Multiplier and an Inversion Unit in GF(2m) , 2003 .
[4] Satoshi Hada,et al. Towards the integration of Web services security on enterprise environments , 2002, Proceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops.
[5] James Won-Ki Hong,et al. XML‐Based Network Management for IP Networks , 2003 .
[6] Moni Naor,et al. Certificate revocation and certificate update , 1998, IEEE Journal on Selected Areas in Communications.
[7] Jose L. Muñoz,et al. Using OCSP to Secure Certificate-Using Transactions in M-commerce , 2003, ACNS.
[8] A. Selkirk. Using XML Security Mechanisms , 2001 .
[9] Byung-Han Ryu,et al. An Efficient Two-Step Paging Strategy Using Base Station Paging Agents in Mobile Communication Networks , 2004 .
[10] Jochen Schiller,et al. Location Based Services , 2004 .
[11] Miika Tuisku,et al. Wireless Java-Enabled MIDP Devices as Peers in a Grid Infrastructure , 2003, European Across Grids Conference.
[12] Steve Hanna,et al. Building Certifications Paths: Forward vs. Reverse , 2001, NDSS.
[13] Sung-Min Lee,et al. TY*SecureWS: An Integrated Web Service Security Solution Based on Java , 2003, EC-Web.
[14] Marco Prandini. Efficient certificate status handling within PKIs: an application to public administration services , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[15] Yuliang Zheng,et al. Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.
[16] Scott Kirkpatrick,et al. Location Based Services Location Based Services , 2005 .
[17] Russ Housley,et al. Delegated Path Validation and Delegated Path Discovery Protocol Requirements , 2001, RFC.
[18] Joonsang Baek,et al. Formal Proofs for the Security of Signcryption , 2002, Journal of Cryptology.
[19] Ji-Hoon Kang,et al. A Gateway and Framework for Telematics Systems Independent on Mobile Networks , 2005 .