Anonymous Limited-Use-Proof Entity Authentication Protocol
暂无分享,去创建一个
Jian Zhou | Meina Song | Junde Song | Liyan Sun | Meina Song | Junde Song | Liyan Sun | Jian Zhou
[1] Steve Muylle,et al. Authentication in e-commerce , 2003, CACM.
[2] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[3] Cheng-Chi Lee,et al. A password authentication scheme over insecure networks , 2006, J. Comput. Syst. Sci..
[4] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.
[5] Kazue Sako,et al. k-Times Anonymous Authentication (Extended Abstract) , 2004, ASIACRYPT.
[6] Almudena Alcaide,et al. Anonymous authentication for privacy-preserving IoT target-driven applications , 2013, Comput. Secur..
[7] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[8] Arne-Kristian Groven,et al. On the Internet of Things, Trust is Relative , 2011, AmI Workshops.
[9] Jung Hee Cheon,et al. Security Analysis of the Strong Diffie-Hellman Problem , 2006, EUROCRYPT.
[10] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[11] Antoine Joux,et al. Separating Decision Diffie–Hellman from Computational Diffie–Hellman in Cryptographic Groups , 2003, Journal of Cryptology.
[12] Kazue Sako,et al. k-Times Anonymous Authentication , 2009, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[14] Christel Baier,et al. Probabilistic ω-automata , 2012, JACM.
[15] Dan Boneh,et al. The Decision Diffie-Hellman Problem , 1998, ANTS.
[16] Jian Zhou,et al. Anonymous Shared Certificate Entity Authentication Protocol , 2013, Wireless Personal Communications.
[17] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[18] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[19] Robert H. Deng,et al. Variations of Diffie-Hellman Problem , 2003, ICICS.
[20] N. Asokan,et al. Anonymity in a Mobile Computing Environment , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[21] Pierre-Louis Cayrel,et al. A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2011, IEEE Trans. Inf. Theory.
[22] Wenliang Du,et al. Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.
[23] Reihaneh Safavi-Naini,et al. Dynamic k-Times Anonymous Authentication , 2005, ACNS.
[24] Rafail Ostrovsky,et al. New Techniques for Noninteractive Zero-Knowledge , 2012, JACM.
[25] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[26] Yi Mu,et al. Certificateless Threshold Ring Signature , 2009, Inf. Sci..
[27] Jean-Jacques Quisquater,et al. A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).
[28] Dieter Gollmann. What do we mean by entity authentication? , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[29] Srilekha Mudumbai,et al. Certificate-based authorization policy in a PKI environment , 2003, TSEC.
[30] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.