Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2010_3_a7, author = {P. A. Pautov}, title = {Authentication in trusted subsystem model using commutative encryption}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {90--95}, publisher = {mathdoc}, number = {3}, year = {2010}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2010_3_a7/} }
P. A. Pautov. Authentication in trusted subsystem model using commutative encryption. Prikladnaâ diskretnaâ matematika, no. 3 (2010), pp. 90-95. http://geodesic.mathdoc.fr/item/PDM_2010_3_a7/
[1] Chong F., Trusted Subsystem Design, MSDN , 2006 http://msdn.microsoft.com/en-us/library/aa905320.aspx
[2] Pautov P. A., “Problema autentifikatsii v mnogourovnevykh prilozheniyakh”, Prikladnaya diskretnaya matematika, 2008, no. 2, 87–90
[3] Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition, Wiley, 1996, 785 pp. | Zbl
[4] Bao F., Deng R. H., Feng P., “An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods”, LNCS, 2015, 2001, 162–170 | Zbl