Anonymous Shared Certificate Entity Authentication Protocol

[1]  Seung-Soo Shin,et al.  Cryptanalysis of a Remote User Authentication scheme using Smart Cards , 2011 .

[2]  Xingming Sun,et al.  An Anonymity and Authentication Mechanism for Internet of Things , 2011 .

[3]  Eckehard G. Steinbach,et al.  A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture , 2011, Future Internet.

[4]  Sidi Mohamed El Yousfi Alaoui,et al.  A Zero-Knowledge Identification Scheme Based on the q-ary Syndrome Decoding Problem , 2010, Selected Areas in Cryptography.

[5]  J. M. Kizza,et al.  Feige-Fiat-Shamir ZKP Scheme Revisited , 2010 .

[6]  Candelaria Hernández-Goya,et al.  Self-organized authentication in mobile ad-hoc networks , 2009, Journal of Communications and Networks.

[7]  Yi Mu,et al.  Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems , 2009, CT-RSA.

[8]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[9]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[10]  Clemens Heinrich,et al.  Pretty Good Privacy (PGP) , 2005, Encyclopedia of Cryptography and Security.

[11]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[12]  Robert H. Deng,et al.  Variations of Diffie-Hellman Problem , 2003, ICICS.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Ronald Cramer,et al.  Introduction to Secure Computation , 1998, Lectures on Data Security.

[15]  Ravi Ganesan,et al.  The Yaksha security system , 1996, CACM.

[16]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[17]  Yvo Desmedt,et al.  Threshold cryptography , 1994, Eur. Trans. Telecommun..

[18]  Steven M. Bellovin,et al.  Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.

[19]  Anthony Ralston,et al.  Encyclopedia of Computer Science , 1971 .