THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 512 |
Dung lượng | 7,85 MB |
Nội dung
Ngày đăng: 17/06/2017, 08:15
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết |
---|---|---|
30. Guajardo, J., Skoric, B., Tuyls, P., Kumar, S., Bel, T., Blom, A., Jan Schrijen, G.: Anti-counterfeiting, key distribution, and key storage in an ambient world via physical unclonable functions. Information Systems Frontiers 11(1), 19–41 (2009) 31. Haberman, B., Mills, D.: Network time protocol version 4: autokey specification,RFC5906 (June 2010), http://www.ietf.org/rfc/rfc5906.txt | Link | |
1. Bangerter, E., Camenisch, J., Lysyanskaya, A.: A cryptographic framework for the controlled release of certified data. In: Proceedings of the 12th International Security Protocols Workshop, pp. 20–42 (2004) | Khác | |
2. Batina, L., Mentens, N., Verbauwhede, I.: Side channel issues for designing secure hardware implementations. In: Proceeding of the 11th IEEE International On-Line Testing Symposium, pp. 118–121 (2005) | Khác | |
3. Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and nonin- teractive anonymous credentials. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 356–374. Springer, Heidelberg (2008) | Khác | |
4. Bichsel, P., Camenisch, J., Groò, T., Shoup, V.: Anonymous credentials on a stan- dard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 600–610 (2009) | Khác | |
5. Birch, D.: Psychic ID: A blueprint for a modern national identity scheme. In:Identity in the Information Society 1(1) (2009) | Khác | |
6. Blanton, M., Hudelson, W.: Biometric-based non-transferable anonymous creden- tials. In: Qing, S., Mitchell, C.J., Wang, G. (eds.) ICICS 2009. LNCS, vol. 5927, pp. 165–180. Springer, Heidelberg (2009) | Khác | |
7. Bleumer, G.: Biometric yet privacy protecting person authentication. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 99–110. Springer, Heidelberg (1998) 8. Boudot, F.: Partial revelation of certified identity. In: Proceedings of the FirstInternational Conference on Smart Card Research and Advanced Applications (CARDIS 2000), pp. 257–272 (2000) | Khác | |
9. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment.Springer, Heidelberg (2003) | Khác | |
10. Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Build- ing in Privacy. MIT Press, Cambridge (2000) | Khác | |
11. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceed- ings of the 11th of the ACM Conference on Computer and Communications Secu- rity (CCS 2004), pp. 225–234 (2004) | Khác | |
12. Bringer, J., Despiegel, V.: Binary feature vector fingerprint representation from minutiae vicinities. In: Proceeding of the 4th IEEE Fourth International Conference on Biometrics: Theory, Applications and Systems, BTAS 2010 (2010) | Khác | |
13. Bringer, J., Chabanne, H., Pointcheval, D., Zimmer, S.: An application of the Boneh and Shacham group signature scheme to biometric authentication. In: Mat- suura, K., Fujisaki, E. (eds.) IWSEC 2008. LNCS, vol. 5312, pp. 219–230. Springer, Heidelberg (2008) | Khác | |
17. Camenisch, J., Thomas, G.: Efficient attributes for anonymous credentials. In: Pro- ceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008), pp. 345–356 (2008) | Khác | |
18. Chaum, D.: Security without identification: transaction systems to make Big Brother obsolete. Communications of the ACM 28(10), 1030–1044 (1985) | Khác | |
19. Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991) | Khác | |
20. Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13–25. Springer, Heidelberg (1998) | Khác | |
21. Deswarte, Y., Gambs, S.: A proposal for a privacy-preserving national identity card. Transactions on Data Privacy 3(3), 253–276 (2010) | Khác | |
22. Deswarte, Y., Quisquater, J.J., Saydane, A.: Remote integrity checking – how to trust files stored on untrusted servers. In: Proceedings of the 6th IFIP WG 11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS 2003), pp. 1–11 (2003) | Khác | |
23. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors, a brief survey of results from 2004 to 2006. In: Tuyls, P., Skoric, B., Kevenaar, T. (eds.) Security with Noisy Data, ch. 5. Springer, Heidelberg (2007) | Khác |
TỪ KHÓA LIÊN QUAN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN