Design and analyses of two basic protocols for use in TTP-based Key escrow (English)
- New search for: Bao, Feng
- New search for: Deng, Robert
- New search for: Han, Yongfei
- New search for: Jeng, Albert
- New search for: Bao, Feng
- New search for: Deng, Robert
- New search for: Han, Yongfei
- New search for: Jeng, Albert
In:
Information Security and Privacy
;
261-270
;
1997
- Article/Chapter (Book) / Electronic Resource
-
Title:Design and analyses of two basic protocols for use in TTP-based Key escrow
-
Contributors:
-
Published in:Information Security and Privacy ; 261-270Lecture Notes in Computer Science ; 1270 ; 261-270
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:1997-01-01
-
Size:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Trusted third parties for secure electronic commerce — Are they neededProfessor Piper, Fred et al. | 1997
- 2
-
Prospectives for modelling trust in information securityJøsang, Audun et al. | 1997
- 14
-
Analysis and implementation of a formal authorization policy design approachBai, Yun / Varadharajan, Vijay et al. | 1997
- 26
-
An approach to dynamic domain and type enforcementTidswell, Jonathon / Potter, John et al. | 1997
- 38
-
Purpose-oriented access control model in object-based systemsTachikawa, Takayuki / Higaki, Hiroaki / Takizawa, Makoto et al. | 1997
- 50
-
User Access Domain Management System-ADAMSTerada1, Masato / Murayama, Yuko et al. | 1997
- 62
-
Revocation of unread e-mail in an untrusted networkRubin, Aviel D. / Boneh, Dan / Fu, Kevin et al. | 1997
- 76
-
Security issues in asynchronous transfer modeVaradharajan, Vijay / Shankaran, Rajan / Hitchens, Michael et al. | 1997
- 90
-
A method to implement a denial of service protection baseLeiwo, Jussipekka / Zheng, Yuliang et al. | 1997
- 102
-
ProtectOS: Operating system and hardware support for small objectsHolford, John / Mohay, George et al. | 1997
- 114
-
Practical memory checkers for stacks, queues and dequesFischlin, Marc et al. | 1997
- 126
-
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fieldsLenstra, Arjen K. et al. | 1997
- 139
-
A new hash function based on block cipherYi, Xun / Lam, Kwok-Yan et al. | 1997
- 147
-
New lower bounds on nonlinearity and a class of highly nonlinear functionsZhang, Xian-Mo / Zheng, Yuliang et al. | 1997
- 159
-
On the security of self-synchronous ciphersMillan, William / Dawson, Ed et al. | 1997
- 171
-
Inefficiency of variant characteristics for substitution-permutation networks with position permutationsSadowski, Albert et al. | 1997
- 183
-
Secret sharing with reusable polynomialsChen, Liqun / Gollmann, Dieter / Mitchell, Chris J. / Wild, Peter et al. | 1997
- 194
-
A message authentication code based on latin squaresBakhtiari, S. / Safavi-Naini, R. / Pieprzyk, J. et al. | 1997
- 204
-
Characterization of (k, n) multi-receiver authenticationKurosawa, Kaoru / Obana, Satoshi et al. | 1997
- 216
-
Cryptanalysis of adaptive arithmetic coding encryption schemesLim, Jen / Boyd, Colin / Dawson, Ed et al. | 1997
- 228
-
Fast correlation attacks and multiple linear approximationsSalmasizadeh, M. / Simpson, L. / Golić, J. Dj. / Dawson, E. et al. | 1997
- 240
-
Verifiable escrowed signatureMao, Wenbo et al. | 1997
- 249
-
Democratic key escrow schemeMan, Chor Wah / Safavi-Naini, Rei. et al. | 1997
- 261
-
Design and analyses of two basic protocols for use in TTP-based Key escrowBao, Feng / Deng, Robert / Han, Yongfei / Jeng, Albert et al. | 1997
- 271
-
Protection of data and delegated keys in digital distributionMambo, Masahiro / Okamoto, Eiji / Sakurai, Kouichi et al. | 1997
- 283
-
New micropayment schemes based on Pay WordsMu, Yi / Varadharajan, Vijay / Lin, Yan-Xia et al. | 1997
- 294
-
On key agreement and conference key agreementBoyd, Colin et al. | 1997
- 303
-
Identity-based and self-certified key-exchange protocolsSaeednia, Shahrokh et al. | 1997
- 314
-
Enabling technology for the trading of MPEG-encoded VideoDittmann, Jana / Steinmetz, Arnd et al. | 1997
- 325
-
Image distribution method with embedded identifier scheme for copyright protectionAbe, Takehito / Fujii, Hiroshi / Kushima, Kazuhiko et al. | 1997