共 50 条
- [31] Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 95 - 125
- [32] Collusion-secure fingerprinting for digital data [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 452 - 465
- [33] Collusion-secure fingerprinting for digital data [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) : 1897 - 1905
- [34] Unconditionally secure digital signatures implemented in an eight-user quantum network* [J]. NEW JOURNAL OF PHYSICS, 2022, 24 (09):
- [35] DNS Security Challenges and Best Practices to Deploy Secure DNS with Digital Signatures [J]. 2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 280 - 285
- [36] Secure network bootstrapping. An algorithm for authentic key exchange and digital signatures [J]. Computers and Security, 1990, 9 (02): : 145 - 152
- [38] Secure digital archiving of high-value data [J]. BT TECHNOLOGY JOURNAL, 2001, 19 (03) : 60 - 66
- [39] A ubiquitous secure and reliable digital data depository system [J]. SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 354 - 358
- [40] Secure digital archiving of high-value data [J]. JOURNAL OF THE INSTITUTION OF BRITISH TELECOMMUNICATIONS ENGINEERS, 2001, 2 : 5 - 9