Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
![]() |
Protocols for secure computationsYao, Andrew C.23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), 1982, p.160-164IEEESem texto completo |
2 |
Material Type: Artigo
|
![]() |
How to exchange (secret) keysBlum, ManuelACM transactions on computer systems, 1983-05, Vol.1 (2), p.175-193 [Periódico revisado por pares]Texto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
Minimum resource zero knowledge proofsKilian, J. ; Micali, S. ; Ostrovsky, R.30th Annual Symposium on Foundations of Computer Science, 1989, p.474-479IEEE Comput. Soc. PressTexto completo disponível |
4 |
Material Type: Ata de Congresso
|
![]() |
Good stream ciphers are hard to designRueppel, R.A.Proceedings. International Carnahan Conference on Security Technology, 1989, p.163-174IEEESem texto completo |
5 |
Material Type: Artigo
|
![]() |
Secure broadcasting using the secure lockChiou, Guang-Huei ; Chen, Wen-TsuenIEEE transactions on software engineering, 1989-08, Vol.15 (8), p.929-934 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
An ID-based signature scheme based upon Rabin's public key cryptosystemChang, C.C. ; Lin, C.H.Proceedings. 25th Annual 1991 IEEE International Carnahan Conference on Security Technology, 1991, p.139-141IEEETexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
On belief evolution in authentication protocolsKailar, R. ; Gligor, V.D.Proceedings Computer Security Foundations Workshop IV, 1991, p.103-116IEEE Comput. Soc. PressTexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Enhanced protocols for hierarchical encryption key management for secure communication in internet environmentsLu, W.P. ; Sundareshan, M.K.IEEE transactions on communications, 1992-04, Vol.40 (4), p.658-660 [Periódico revisado por pares]NEW YORK: IEEETexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
Interconnecting domains with heterogeneous key distribution and authentication protocolsPiessens, F. ; De Decker, B. ; Janson, P.Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993, p.66-79IEEE Comput. Soc. PressTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
A new generalized group-oriented cryptoscheme without trusted centersChang, Chin-Chen ; Lee, Horng-ChinIEEE journal on selected areas in communications, 1993-06, Vol.11 (5), p.725-729 [Periódico revisado por pares]New York, NY: IEEETexto completo disponível |