Modeling Security Bridge Certificate Authority Architecture
スポンサーリンク
概要
- 論文の詳細を見る
- 2009-06-01
著者
-
SAKURAI Kouichi
Dept. of Computer Science and Communication Engineering, Kyushu University
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
LI Mingchu
School of Software, Dalian University of Technology
-
Li Mingchu
School Of Software Dalian University Of Technology
-
REN Yizhi
School of Software, Dalian University of Technology
-
Sakurai Kouichi
Dept. Of Computer Science And Communication Engineering Kyushu University
-
Sakurai Kouichi
Information Technology And Security Group Department Of Computer Science And Communication Engineeri
-
Ren Yizhi
School Of Software Dalian University Of Technology
-
Ren Yizhi
Dept. Of Informatics Kyushu University
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- Analysis of Existing Privacy-Preserving Protocols in Domain Name System
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- FOREWORD
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection (Theoretical Computer Science and Its Applications)
- Special Section on Cryptography and Information Security
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Timing Attacks against a Parallelized RSA Implementation (特集:プライバシを保護するコンピュータセキュリティ技術)
- A Progress Report on Lattice Based Public-Key Cryptosystems : Theoretical Security versus Practical Cryptanalysis(Special Issue on Algorithm Engineering : Surveys)