Pervasive digital signatures : Syntactic robustness and simplicity of signed documents
暂无分享,去创建一个
Argyris Arnellos | Thomas Spyrou | John Darzentas | Dimitrios Lekkas | J. Darzentas | Argyris Arnellos | T. Spyrou | D. Lekkas
[1] Trustworthiness of signed data , 2002 .
[2] V. Akila,et al. Information , 2001, The Lancet.
[3] Dimitris Gritzalis,et al. Cumulative notarization for long-term preservation of digital signatures , 2004, Comput. Secur..
[4] C. Mitchell,et al. Digitally Signed Documents – Ambiguities and Solutions , 2004 .
[5] Karl Scheibelhofer. What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification , 2001, Communications and Multimedia Security.
[6] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[7] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[8] Loren M. Kohnfelder,et al. Towards a practical public-key cryptosystem. , 1978 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] B. Küppers. Information and the origin of life , 1990 .
[11] Marc Girault,et al. Self-Certified Public Keys , 1991, EUROCRYPT.
[12] Ueli Maurer. Intrinsic Limitations of Digital Signatures and How to Cope with Them , 2003, ISC.
[13] Carlisle M. Adams,et al. Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) , 2001, RFC.
[14] Jean Scholtz,et al. Toward a Framework for Evaluating Ubiquitous Computing Applications , 2004, IEEE Pervasive Comput..
[15] Audun Jøsang,et al. What You See is Not Always What You Sign , 2002 .
[16] Ravi S. Sandhu,et al. Models, protocols, and architectures for secure pervasive computing: challenges and research directions , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.