Exploiting social networks for threshold signing: attack-resilience vs. availability
暂无分享,去创建一个
[1] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[2] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[3] Mihir Bellare,et al. A Forward-Secure Digital Signature Scheme , 1999, CRYPTO.
[4] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[5] Douglas N. Hoover,et al. Software smart cards via cryptographic camouflage , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] Michael K. Reiter,et al. Two-party generation of DSA signatures , 2001, International Journal of Information Security.
[7] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[8] Shouhuai Xu,et al. Strong Key-Insulated Signature Schemes , 2003, Public Key Cryptography.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[11] Noga Alon,et al. Spectral Techniques in Graph Algorithms , 1998, LATIN.
[12] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[13] Burton S. Kaliski,et al. Server-assisted generation of a strong secret from a password , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[14] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[15] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[16] David Mazières,et al. Proactive Two-Party Signatures for User Authentication , 2003, NDSS.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[19] Michael K. Reiter,et al. Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.
[20] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[21] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[22] Albert-László Barabási,et al. Error and attack tolerance of complex networks , 2000, Nature.
[23] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[24] Radia J. Perlman,et al. Secure Password-Based Protocol for Downloading a Private Key , 1999, NDSS.
[25] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[26] Shouhuai Xu,et al. Two Efficient and Provably Secure Schemes for Server-Assisted Threshold Signatures , 2003, CT-RSA.
[27] L. da F. Costa,et al. Characterization of complex networks: A survey of measurements , 2005, cond-mat/0505185.
[28] Ravi Ganesan,et al. Yaksha: augmenting Kerberos with public key cryptography , 1995, Proceedings of the Symposium on Network and Distributed System Security.
[29] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[30] Shouhuai Xu,et al. Protecting Cryptographic Keys from Memory Disclosure Attacks , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[31] Lexi Pimenidis,et al. Targeting Physically Addressable Memory , 2007, DIMVA.
[32] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[33] Gene Itkis,et al. SiBIR: Signer-Base Intrusion-Resilient Signatures , 2002, CRYPTO.