A Certification Scheme for Electronic Commerce
暂无分享,去创建一个
[1] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[2] Michael Roe. PASSWORD R2.5 : Certification Authority Requirements , 1993 .
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[6] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[7] Jerome H. Saltzer,et al. Section E.2.1 Kerberos Authentication and Authorization System , 1988 .
[8] Moti Yung,et al. Weaknesses of undeniable signature schemes , 1991 .
[9] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.