1 |
Dan Bonehy Matthew Franklin, 'Identity-based encryption from the Weil Pairing', extended abstract in Advances in Cryptology-Crypto 2001, Lecture Notes in Computer Science, Vol.2139, Sprmger-Verlag, pp. 231-229, Aug. 2001
|
2 |
Dan Boneh, Ben Lynn, Hovav Shacham, 'Short signatures from the Weil pairing', in Advances in Cryptology-AsiaCrypt 2001, Lecture Notes in Computer Science, Vol. 2248, Springer-Verlag, pp. 514-532, 2001
DOI
ScienceOn
|
3 |
Jae Choon Cha and Jung Hee Cheon, An identity-based signature from gap Diffie-Hellman groups, PKC 2003, Lecture Notes in Computer Science 2567 (2002), pp.18-30
DOI
|
4 |
Jeyanthi Hall, Susan Kilbank, Michel Barbeau and Evangelos Kranakis, 'WPP: A Secure Payment Protocol for Supporting Credit-card and Debit-card Transactions Over Wireless Networks,' IEEE International Conference on Teleconununications (ICT), Bucharest, June, 2001
|
5 |
Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, 'Handbook of Applied Cryptography' CRC Press, October 16, 1996, ISBN: 0849385237
|
6 |
Pekka Niskanen and Jukka Heika 'Inside WAP : Programming Applications with WML and WMLScript'Addison-Wesley, 2000
|
7 |
이상곤, 윤태은 'EC - KCDSA 부분 은닉서명을 이용한 거스름 재사용 가능한 전지수표지불시스템' 한국정보보호학회논문지 제13권 제1호, 2003. 2
|
8 |
조유근, 'SET 프로토콜을 위한 안전하고 효율적인 지불 게이트웨이의 설계 및 구현', 서울대학교 석사논문, 2000년 2월
|
9 |
이병래, 장경아, 김태윤 '3세대 이동통신을 위한 티켓 기반 인증 및 지불 기법' 정보과학회논문지: 정보통신 제29권 제4호, 2002.8
|
10 |
Nigel P. Smart, 'An Identity based authenticated Key Agreement Protocol based on the Weil pairing', Cryptology ePrint Archive, Report 2001/111,2001. http://eprint.iacr.org/
|
11 |
이동훈, 임채훈, 'TLS와 WTLS의 비교 분석', (주)퓨처시스템 암호체계센터 기술보고서, Oct.2000
|
12 |
Keith M. Martin , Bart Preneel , Chris J Mitchell , Hans-Joachim Hitz , Horn, A. Poliakova , P. Howard, 'Secure Billing for Mobile Information Services in UMTS', Proceedings of the 5th International Conference on Intelligence and Services in Networks:Technology for Ubiquitous Telecom Services, p.535-548, May 25-28, 1998
|
13 |
Divya Nalla, and K.C.Reddy, 'ID-based tripartite Authenticated Key Agreement Protocols from pairings' available at http://eprint.iacr.org/2003/004.pdf
|
14 |
Tatsuaki Okamoto and David Pointcheval 'The gap-problems: a new class of problems for the security of cryptographic Schemes, Proc. of PKC '01, Lecture Nores in Computer Sciences,Vol. 1992, pp. 104-118, Springer-Verlag, 2001
DOI
ScienceOn
|
15 |
Dan Boneh, 'The decision Diffie-Hellman problem', in Proc. Third Algorithmic Number Theory Symposium, Lecture Notes in Computer Science, Vol. 1423, Springer-Verlag, pp. 48-63, 1998
DOI
ScienceOn
|
16 |
Whitfield Diffie and Martin E. Hellman, 'New Directions in Cryptography' IEEE Transactions on Informations Theory, Vol, IT-22, No 6, pp.472-492, Nov,1976
|
17 |
이만영, 김지홍, 류재철, 송유진, 염흥렬, 이임영, '전자상거래 보안 기술', 생능출판사, 1999
|
18 |
Adi Shamir 'Identity based cryptosystems and signature schemes' Advances in Cryptology Proceedings of Crypto'84, pp.47-57
|
19 |
Gunter Horn, Bart Preneel, 'Authentication and Payment in Future Mobile Systems,' ESORICS, LNCS 1485,pp.277-293, 1998
DOI
ScienceOn
|
20 |
Tim Dierks and Christopher Allen, 'The TLS Protocol Version 1.0' IETF RFC 2246, January 1999
|
21 |
한대완, 이동훈, 황상철, 류재철 'WISA2002에 제안된 무선 전자 지불 시스템의 안전성' 정보보호학회 논문지 13권 6호 2003.12
|
22 |
WAP Fourm, 'Wireless Application Protocol Wireless Transport Layer Security Spectification version 18-FEB-2000', 2000
|