Secure Software Smartcard Resilient to Capture
暂无分享,去创建一个
[1] Michael K. Reiter,et al. Two-party generation of DSA signatures , 2001, International Journal of Information Security.
[2] Rafail Ostrovsky,et al. How to withstand mobile virus attacks (extended abstract) , 1991, PODC '91.
[3] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[4] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[5] Markus Jakobsson,et al. Proactive public key and signature systems , 1997, CCS '97.
[6] Michael K. Reiter,et al. Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.
[7] Taekyoung Kwon,et al. Robust Software Tokens: Towards Securing a Digital Identity , 2001, IACR Cryptol. ePrint Arch..
[8] Douglas N. Hoover,et al. Software smart cards via cryptographic camouflage , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[9] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.