Online Public Key Cryptographic Scheme For Data Security In Bridge Health Monitoring
暂无分享,去创建一个
[1] Taekyoung Kwon,et al. Robust Software Tokens - Yet Another Method for Securing User's Digital Identity , 2003, ACISP.
[2] Douglas N. Hoover,et al. Software smart cards via cryptographic camouflage , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[3] Dan Boneh,et al. Fine-grained control of security capabilities , 2004, TOIT.
[4] Dan Boneh,et al. A Method for Fast Revocation of Public Key Certificates and Security Capabilities , 2001, USENIX Security Symposium.
[5] Michael K. Reiter,et al. Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.
[6] Burton S. Kaliski,et al. Server-assisted generation of a strong secret from a password , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[7] Thomas Wu,et al. The SRP Authentication and Key Exchange System , 2000, RFC.
[8] Mihir Bellare,et al. The Security of Practical Two-Party RSA Signature Schemes , 2001, IACR Cryptol. ePrint Arch..