Authentication using minimally trusted servers
暂无分享,去创建一个
[1] Dieter Gollmann,et al. Distributing Trust Amongst Multiple Authentication Servers , 1995, J. Comput. Secur..
[2] Catherine A. Meadows,et al. The Role of Trust in Information Integrity Protocols , 1995, J. Comput. Secur..
[3] Chris J. Mitchell,et al. A Proposed Architecture for Trusted Third Party Services , 1995, Cryptography: Policy and Algorithms.
[4] Li Gong,et al. Increasing Availability and Security of an Authentication Service , 1993, IEEE J. Sel. Areas Commun..
[5] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Thomas Beth,et al. Trust-based navigation in distributed systems , 1994 .
[8] C. Moler,et al. Advances in Cryptology , 2000, Lecture Notes in Computer Science.
[9] Gene Tsudik,et al. Refinement and extension of encrypted key exchange , 1995, OPSR.