Key Recovery System for the Commercial Environment
暂无分享,去创建一个
Ed Dawson | Colin Boyd | Juan Manuel González Nieto | Kapali Viswanathan | E. Dawson | C. Boyd | Kapali Viswanathan | J. G. Nieto
[1] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[2] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[3] Jacques Stern,et al. Recovering keys in open networks , 1999, Proceedings of the 1999 IEEE Information Theory and Communications Workshop (Cat. No. 99EX253).
[4] Chris J. Mitchell,et al. A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.
[5] David Safford,et al. Two-phase cryptographic key recovery system , 1997, Comput. Secur..
[6] Colin Boyd. Enforcing traceability in software , 1997, ICICS.
[7] Birgit Pfitzmann,et al. How to break fraud-detectable key recovery , 1998, OPSR.
[8] Lars R. Knudsen,et al. In Search of Multiple Domain Key Recovery , 1998, J. Comput. Secur..
[9] Eric R. Verheul,et al. Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals , 1997, EUROCRYPT.
[10] Lars R. Knudsen,et al. On the Difficulty of Software Key Escrow , 1996, EUROCRYPT.
[11] Dorothy E. Denning,et al. A taxonomy for key escrow encryption systems , 1996, CACM.
[12] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[13] Walter Fumy,et al. Advances in Cryptology — EUROCRYPT ’97 , 2001, Lecture Notes in Computer Science.