A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
Time Sharing Computer Systems
Incremental cryptography and application to virus protection
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Flexible authentication of XML documents
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Accountable-subgroup multisignatures: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Stack and Queue Integrity on Hostile Platforms
IEEE Transactions on Software Engineering
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Provably Unforgeable Signatures
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Efficient Long-Term Validation of Digital Signatures
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Authenticating distributed data using Web services and XML signatures
Proceedings of the 2002 ACM workshop on XML security
An efficient stream authentication scheme using tree chaining
Information Processing Letters
Certifying data from multiple sources [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Authenticating Query Results in Edge Computing
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Fast approximate probabilistically checkable proofs
Information and Computation
On the design of time-stamped signatures
Journal of Computer and System Sciences
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
Structural signatures for tree data structures
Proceedings of the VLDB Endowment
Proceedings of the second ACM conference on Wireless network security
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
Performance study of online batch-based digital signature schemes
Journal of Network and Computer Applications
EGSI: TGKA Based Security Architecture for Group Communication in Grid
CCGRID '10 Proceedings of the 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing
Combinatorial multicollision attacks on generalized iterated hash functions
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Securing computerised models and data against integrity attacks
International Journal of Electronic Finance
Secure naming in information-centric networks
Proceedings of the Re-Architecting the Internet Workshop
A novel cryptoprocessor architecture for chained Merkle signature scheme
Microprocessors & Microsystems
Algebraic construction for zero-knowledge sets
Journal of Computer Science and Technology
Logical attestation: an authorization architecture for trustworthy computing
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Proofs of ownership in remote storage systems
Proceedings of the 18th ACM conference on Computer and communications security
Authenticated in-network programming for wireless sensor networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Efficient query integrity for outsourced dynamic databases
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Proceedings of the 2012 ACM conference on Computer and communications security
Secure data deletion from persistent media
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
CorrectDB: SQL engine with practical query authentication
Proceedings of the VLDB Endowment
Hi-index | 0.00 |
A practical digital signature system based on a conventional encryption function which is as secure as the conventional encryption function is described. Since certified conventional systems are available it can be implemented quickly, without the several years delay required for certification of an untested system.