- 1 EIGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31 (1985), 469-472.Google ScholarCross Ref
- 2 Kaliski, B.S. Jr. An overview of the PKCS standards. Tech. Rep., RSA Data Security, Inc., June 1991.Google Scholar
- 3 National Institute for Standards and Technology. Digital signature standard (DSS). Federal Register 56 (Aug. 30 1991), 169.Google Scholar
- 4 National Institute for Standards and Technology. A proposed federal information processing standard for digital signature standard (DSS). Tech. Rep. FIPS PUB XX, National Institute for Standards and Technology, Aug. 1991. DRAFT.Google Scholar
- 5 Schnorr, C.P. Efficient identification and signatures for smart cards. In G. Brassard, Ed., Proceedings CRYPTO 89, Springer, 1990. Lecture Notes in Computer Science No. 435. pp. 239-252. Google ScholarDigital Library
- 1 Diffie W., and Heliman, M.E. New directions in cryptography. IEEE Trans. Inf. Theory 17"-22 (1976), 472-492.Google Scholar
- 2 EIGamal, T. A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31 (1985), 469-472.Google Scholar
- 3 LaMacchia, B.A., and Odlyzko, A.M. Computation of discrete logarithms in prime fields. Design, Codes, and Cryptography, vol. 1, 1991, pp. 47-62. Google ScholarDigital Library
- 4 Pohlig, S.C., and Hellman, M.E. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inf. Theory IT-24 (1978), 106- 110.Google ScholarDigital Library
- 5 Rivest, R.L., Shamir, A., Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Corafaun. ACM 21 (1978), 120-126. Google ScholarDigital Library
- 6 Schnorr, C.P. Efficient identification and signatures for smart cards. Advances in cryptolog): Proceedings of Crypto '89, G. Brassard Ed., Lecture Notes in Computer Science 435, Springer-Verlag, N.Y., pp. 239-251. Google ScholarDigital Library
Index Terms
Responses to NIST's proposal
Recommendations
Rebuttal to the NIST RBAC model proposal
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access controlIn this abstract, we rebut the proposed RBAC unified reference model as defined by Sandhu, Ferriaolo, and Kuhn [4]. As a unified reference model, this proposal simply re-enforces some of the concepts that are fundamental to RBAC (i.e., roles, users, and ...
Role of online communities in recent responses to disasters: Tsunami, China, Katrina, and Haiti
ASIS&T '10: Proceedings of the 73rd ASIS&T Annual Meeting on Navigating Streams in an Information Ecosystem - Volume 47The initial response to the Indonesian Tsunami was from a handful of bloggers. This small group grew into a community which ultimately spanned the globe and played a critical role in coordinating communication and resources. A similar online community ...
Proposal of New Disaster Support System for Large-Scale Natural Disaster
NBIS '14: Proceedings of the 2014 17th International Conference on Network-Based Information SystemsThis paper proposes New Disaster Support System at the time of large-scale natural disaster. This Disaster Support System consists of Relief Supplies Distribution Management System and IC Card Authorization Safety Confirmation System. Relief Supplies ...
Comments