共 15 条
- [1] [Anonymous], 1993, ACM CCS 1993, DOI DOI 10.1145/168588.168596
- [2] Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433
- [3] Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
- [4] Boyko V, 2000, LECT NOTES COMPUT SC, V1807, P156
- [5] Brainard J, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P201
- [6] Bresson E., 2001, P 8 ACM C COMP COMM, P255, DOI DOI 10.1145/501983.502018
- [7] Universally composable security: A new paradigm for cryptographic protocols [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
- [9] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [10] Server-assisted generation of a strong secret from a password [J]. IEEE 9TH INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2000, : 176 - 180