Using OCSP to Secure Certificate-Using Transactions in M-commerce (English)
Free access
- New search for: Muñoz, Jose L.
- New search for: Forné, Jordi
- New search for: Esparza, Oscar
- New search for: Soriano, Bernabe Miguel
- New search for: Muñoz, Jose L.
- New search for: Forné, Jordi
- New search for: Esparza, Oscar
- New search for: Soriano, Bernabe Miguel
In:
Applied Cryptography and Network Security
7
;
280-292
;
2003
- Article/Chapter (Book) / Electronic Resource
-
Title:Using OCSP to Secure Certificate-Using Transactions in M-commerce
-
Contributors:Muñoz, Jose L. ( author ) / Forné, Jordi ( author ) / Esparza, Oscar ( author ) / Soriano, Bernabe Miguel ( author )
-
Published in:Applied Cryptography and Network Security , 7 ; 280-292Lecture Notes in Computer Science ; 2846, 7 ; 280-292
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2003-01-01
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error CaseNikov, Ventzislav / Nikova, Svetla / Preneel, Bart et al. | 2003
- 16
-
Optimized χ 2-Attack against RC6Isogai, Norihisa / Matsunaka, Takashi / Miyaji, Atsuko et al. | 2003
- 33
-
Anonymity-Enhanced Pseudonym SystemTamura, Yuko / Miyaji, Atsuko et al. | 2003
- 48
-
Using Feedback to Improve Masquerade DetectionYung, Kwong H. et al. | 2003
- 63
-
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet ServicesGuo, Zhi / Lam, Kwok-Yan / Chung, Siu-Leung / Gu, Ming / Sun, Jia-Guang et al. | 2003
- 76
-
An IP Traceback Scheme Integrating DPM and PPMMin, Fan / Zhang, Jun-yan / Yang, Guo-wie et al. | 2003
- 86
-
Improved Scalable Hash Chain TraversalKim, Sung-Ryul et al. | 2003
- 96
-
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm ProblemZhang, Rui / Imai, Hideki et al. | 2003
- 111
-
On the Security of Two Threshold Signature Schemes with Traceable SignersWang, Guilin / Han, Xiaoxi / Zhu, Bo et al. | 2003
- 123
-
Proxy and Threshold One-Time SignaturesAl-Ibrahim, Mohamed / Cerny, Anton et al. | 2003
- 137
-
A Threshold GQ Signature SchemeLiu, Li-Shan / Chu, Cheng-Kang / Tzeng, Wen-Guey et al. | 2003
- 151
-
Generalized Key-Evolving Signature Schemes or How to Foil an Armed AdversaryItkis, Gene / Xie, Peng et al. | 2003
- 169
-
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature SchemeGao, Chong-zhi / Yao, Zheng-an / Li, Lei et al. | 2003
- 176
-
Modelling and Evaluating Trust Relationships in Mobile Agents Based SystemsLin, Ching / Varadharajan, Vijay et al. | 2003
- 191
-
An Authorization Model for E-consent Requirement in a Health Care ApplicationRuan, Chun / Varadharajan, Vijay et al. | 2003
- 206
-
PLI: A New Framework to Protect Digital Content for P2P NetworksGu, Guofei / Zhu, Bin B. / Li, Shipeng / Zhang, Shiyong et al. | 2003
- 217
-
Improved Algebraic Traitor Tracing SchemeBai, Chunyan / Feng, Guiliang et al. | 2003
- 228
-
Common Vulnerability Markup LanguageTian, Haitao / Huang, Liusheng / Zhou, Zhi / Zhang, Hui et al. | 2003
- 241
-
Trust on Web Browser: Attack vs. DefenseLi, Tie-Yan / Wu, Yongdong et al. | 2003
- 254
-
Security Protocols for Biometrics-Based Cardholder Authentication in SmartcardsRila, Luciano / Mitchell, Chris J. et al. | 2003
- 265
-
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third PartyChoi, Jae-Gwi / Sakurai, Kouichi / Park, Ji-Hwan et al. | 2003
- 280
-
Using OCSP to Secure Certificate-Using Transactions in M-commerceMuñoz, Jose L. / Forné, Jordi / Esparza, Oscar / Soriano, Bernabe Miguel et al. | 2003
- 293
-
Differential Fault Analysis on A.E.SDusart, Pierre / Letourneux, Gilles / Vivolo, Olivier et al. | 2003
- 307
-
Side-Channel Attack on Substitution BlocksNovak, Roman et al. | 2003
- 319
-
Timing Attack against Implementation of a Parallel Algorithm for Modular ExponentiationSakai, Yasuyuki / Sakurai, Kouichi et al. | 2003
- 331
-
A Fast Correlation Attack for LFSR-Based Stream CiphersPalit, Sarbani / Roy, Bimal K. / De, Arindom et al. | 2003
- 343
-
Making the Key Agreement Protocol in Mobile ad hoc Network More EfficientYao, Gang / Ren, Kui / Bao, Feng / Deng, Robert H. / Feng, Dengguo et al. | 2003
- 357
-
An Efficient Tree-Based Group Key Agreement Using Bilinear MapLee, Sangwon / Kim, Yongdae / Kim, Kwangjo / Ryu, Dae-Hyun et al. | 2003
- 372
-
A Key Recovery Mechanism for Reliable Group Key ManagementCho, Taenam / Lee, Sang-Ho et al. | 2003
- 387
-
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner ModelChowdhury, Sandeepan / Maitra, Subhamoy et al. | 2003
- 403
-
Efficient Distributed Signcryption Scheme as Group SigncryptionKwak, DongJin / Moon, SangJae et al. | 2003
- 418
-
Architectural Enhancements for Montgomery Multiplication on Embedded RISC ProcessorsGroßschädl, Johann / Kamendje, Guy-Armand et al. | 2003