References
- Proc. of the 2nd Aizu Int'l Symposium on Parallel Algorithm/Architecture Synthesis(pAs97) Mobile Agents for Mobile Computing R. Gray;D. kotz;S. Nog;D. Rus;G. Cybenco
- Mobile Object Systems Security and Communication in Mobile Agents Systems J. Vitek;M. Serrao;D. Thanos
- Mobile Object Systems Safe and Secure Execution Mechanisms for Mobile Objects Kazuhiko Kato
- Proceedings of the IEEE v.76 no.5 A Survey of Information Authentication Gustavus J. Simmons
- IEEE Transactions on Information Theory v.IT-22 no.6 New directions in cryptography W. Diffie;M. Hellman
- Proceedings of the IEEE v.76 no.5 The First Ten Years of Public-Key Cryptography Whitfield Diffie
- Advances Cryptology, Proceedings of Crypto'89 Efficient Identification and Signatures for Smart Cards C. P. Schnorr
- Advances in Cryptology, Proceedings of Crypto'92 Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes Tatsuaki Okamoto
- Applied Cryptography(2nd Edition) B. Schneier
- Handbook of Applied Cryptography Alfred J.;Menezed Paul C. van Oorschot;Scott A. Vanstone
- Advances in Cryptology, Proceedings of CRYPTO'86 How to Prove Yourself: Practical Solution to Identification and Signature Problems A. Fiat;A. Shamir
- Proceedings of the 19th Annual ACM Symposium of Theory of Computing Zero Knowledge Proofs of Identity U. Feige;A. Fiat;A. Shamir
- Advances in Cryptology, Proceedings of Eurocrypt'88 A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory L. C. Guillou;J. J. Quisquater
- IEEE Transactions on Information Theory v.IT-30 no.4 A Public Key Cryptosystem and a Signature Scheme based on Discrete logarithms T. ElGamal
- Communications of the ACM v.21 no.2 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems R. L. Rivest;A. Shamir;L. Adleman
- SIAM Journal of Computing v.18 no.1 The Knowledge Complexity of Interactive Proofs S. Goldwasser;S. micali;C. Rackoff
- Advances in Cryptology, Proceedings of Crypto'99 A Modification of the Fiat-Shamir Scheme Kazuo Ohta;Tatsuaki Okamoto
- Technical Report TR-81 How to exchange secrets by oblivious transfer M. Rabin
- Advances in Cryptology-Crypto 89 v.435 Non-Interactive Oblivious Transfer and Applications Mihir Bellare;Silvio Micali
- Proceedings of the 20th Annual ACM Symposium on Theory of Computing Non-Interactive Zero-Knowledge Proof System and Applications M. Blum;P. Feldman;S. Micali
- ICALP'97 Conference Randomness-Efficient Non-Interactive Zero Knowledge Alfredo De Santis;Giovanni Di Crescenzo;Pino Persino
- Advances in Cryptology -Crypto'87 v.293 Non-Interactive Zero-Knowledge Proof-Systems A. D. Santis;S. Micali;G. Persiano
- Advances in Cryptology-Crypto'88 v.403 Non-Interactive Zero-Knowledge Proof-Systems with Preprocessing A. D. Santis;S. Micali;G. Persiano
- Technical Reports MIT/LCS/TR-579b Fair Cryptosystems S. Micali
- Proc. of 2nd Aizu Int'l Symposium on Parallel Algorithm/Architecture Synthesis(pAs97) Mobile Agents for Mobile Computing R. Gray;D. Kotz;S. Nog;D. Rus;G. Cybenco
- Technical Report Mobile Agents: Are they a good idea? C. G. Harrison;D. M. Chess;A. Kershenbaum
- Communication of the ACM v.37 no.7 Software Agents M. R. Genesereth;S. P. Ketchpel
- paper for the Mobile Object Systems ECoop Workshop'97 Protecting Mobile Agents through Tracing Vigna;Giovani