Key management for decentralized computer network services
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[3] David Chaum,et al. Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms , 1990, AUSCRYPT.
[4] David Chaum,et al. Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms , 1985, EUROCRYPT.
[5] K. Ohta,et al. Membership authentication for hierarchical multigroups using a master secret key , 1990 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[8] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.
[9] Chi-Sung Laih,et al. Password authentication using public-key cryptography , 1989 .
[10] Jean-Jacques Quisquater,et al. CORSAIR: A SMART Card for Public Key Cryptosystems , 1990, CRYPTO.
[11] Underwood Dudley. Elementary Number Theory , 1978 .