Design of Self-Delegation for Mobile Terminals
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop , 1998, CRYPTO.
[2] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[3] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[4] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[5] David Chaum,et al. Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms , 1990, AUSCRYPT.
[6] Christoph G. Günther,et al. An Identity-Based Key-Exchange Protocol , 1990, EUROCRYPT.
[7] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[8] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[9] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[10] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[11] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[12] Fumiyuki Adachi,et al. The Overview of the New Generation Mobile Communication System and the Role of Software Defined Radio Technology , 2003 .
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..