Automatic Event-Stream Notarization Using Digital Signatures
暂无分享,去创建一个
[1] R. A. Rueppel,et al. Message recovery for signature schemes based on the discrete logarithm problem , 1996 .
[2] Ross J. Anderson. Liability and Computer Security: Nine Principles , 1994, ESORICS.
[3] David Chaum,et al. Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .
[4] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[5] Charles Cresson Wood,et al. Security for computer networks : D.W. Davies and W.L. Price New York: John Wiley and Sons, 1984. 386 + xix pages, $19.50 , 1985, Computers & security.
[6] Ross J. Anderson. UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.
[7] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[8] Gustavus J. Simmons,et al. The Prisoners' Problem and the Subliminal Channel , 1983, CRYPTO.
[9] Ross J. Anderson,et al. Robustness Principles for Public Key Protocols , 1995, CRYPTO.