Using the Boneh-Franklin and Boneh-Boyen Identity-Based Encryption Algorithms with the Cryptographic Message Syntax (CMS)
暂无分享,去创建一个
[1] P. T. Barry,et al. Abstract syntax notation-one (ASN.1) , 1992 .
[2] Scott O. Bradner,et al. Key words for use in RFCs to Indicate Requirement Levels , 1997, RFC.
[3] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[4] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[5] Doughan Turk,et al. Configuring BGP to Block Denial-of-Service Attacks , 2004, RFC.
[6] Murugiah P. Souppaya,et al. Security Configuration Checklists Program for IT Products: Guidance for Checklists Users and Developers , 2005 .
[7] Xavier Boyen,et al. Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems , 2007, RFC.
[8] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[9] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[10] Russ Housley,et al. Cryptographic Message Syntax (CMS) , 2002, RFC.
[11] Guido Appenzeller,et al. Identity-Based Encryption Architecture and Supporting Data Structures , 2009, RFC.