Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2014_21_2_a0, author = {E. A. Tolyupa}, title = {Method of {Anti-Virus} {Protection} {Based} on $(n,t)$ {Threshold} {Proxy} {Signature} with an {Arbitrator}}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {5--14}, publisher = {mathdoc}, volume = {21}, number = {2}, year = {2014}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/} }
TY - JOUR AU - E. A. Tolyupa TI - Method of Anti-Virus Protection Based on $(n,t)$ Threshold Proxy Signature with an Arbitrator JO - Modelirovanie i analiz informacionnyh sistem PY - 2014 SP - 5 EP - 14 VL - 21 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/ LA - ru ID - MAIS_2014_21_2_a0 ER -
E. A. Tolyupa. Method of Anti-Virus Protection Based on $(n,t)$ Threshold Proxy Signature with an Arbitrator. Modelirovanie i analiz informacionnyh sistem, Tome 21 (2014) no. 2, pp. 5-14. http://geodesic.mathdoc.fr/item/MAIS_2014_21_2_a0/
[1] http://letitbit.org/terms/
[2] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures: Delegation of the power to sign messages”, IEICE Trans. Fundamentals, E79-A:9 (1996), 1338–1353
[3] M. Mambo, K. Usuda, E. Okamoto, “Proxy signatures for delegating signing operation”, Proc. of 3rd ACM Conference on Computer and Communications Security, CCS'96, ACM Press, 1996, 48–57
[4] S. Kim, S. Park, D. Won, “Proxy signatures, revisited”, Information and Communications Security, ICICS'97, LNCS 1334, Springer-Verlag, 1997, 223–232 | Zbl
[5] B. Lee, H. Kim, K. Kim, “Strong proxy signature and its applications”, Proceedings of the 2001 Symposium on Cryptography and Information Security, SCIS'01 (Oiso, Japan, Jan. 23–26, 2001), v. 2/2, 603–608 | Zbl
[6] Tolyupa E. A., “An Algorithm of $(n; t)$-Threshold Proxy Signature with an Arbitrator”, Modeling and analysis of information systems, 20:4 (2013), 55–70 (in Russian)
[7] C. Kaufman, R. Perlman, M. Speciner, Network Security: Private Communication in a Public World, Prentice-Hall PTR, 2002
[8] Gorbatov V. S., Polyanskaya O. Yu., Osnovy tekhnologii PKI, Goryachaya liniya-Telekom, M., 2004 (in Russian)
[9] M. Cooper, Y. Dzambasow, P. Hesse, S. Joseph, R. Nicholas, Internet X.509 Public Key Infrastructure: Certification Path Building, RFC 4158, September 2005
[10] Federalnyy zakon ob elektronnoy podpisi No 169-FZ ot 01.07.2011 (in Russian)
[11] J.-Y. Lee, J.-H. Cheon, S. Kim, An analysis of proxy signatures: Is a secure channel necessary?, LNCS, 2612, 2003, 68–79 | MR | Zbl
[12] G. Wang, F. Bao, J. Zhou, R. H. Deng, “Security Analysis of Some Proxy Signatures”, Proc. Information Security and Cryptology – ICISC. 2003, LNCS, 2971, Springer-Verlag, 2004, 305–319 | MR
[13] Alferov A. P., Zubov A. Yu., Kuzmin A. S., Cheremushkin A. V., Osnovy kriptografii, Gelios ARV, M., 2002 (in Russian)