Identity-based Key Infrastructures (IKI)
暂无分享,去创建一个
[1] Yvo Desmedt,et al. Is hierarchical public-key certification the next target for hackers? , 2004, CACM.
[2] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[3] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[4] Yvo Desmedt,et al. Trust and security: A new look at the Byzantine generals problem , 1996, Network Threats.
[5] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[6] Bruce Schneier,et al. Ten Risks of PKI , 2004 .
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Michael K. Reiter,et al. Path independence for authentication in large-scale systems , 1997, CCS '97.
[9] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[10] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[11] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[12] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .