An identity-based single-sign-on scheme for computer networks
暂无分享,去创建一个
[1] Victor Shoup. On the Security of a Practical Identification Scheme , 1996, EUROCRYPT.
[2] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[3] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[4] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Gustavus J. Simmons,et al. An Impersonation-Proof Identity Verfication Scheme , 1987, CRYPTO.
[9] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.