參考文獻 |
[1]. B. Schneier, "Chapter 15.1 Pretty Good Privacy," Applied Cryptography, John Wiley & Sons Inc., 2nd edition, 1996.
[2]. D. E. Denning and D.K. Branstad, "A taxonomy for key escrow encryption systems," Communications of ACM, Vol. 39, No. 3, pp. 34-40, 1996.
[3]. D. E. Denning and M. Smid, "Key escrowing today," IEEE Communication Magazine, Vol. 32, pp. 58-68, 1994.
[4]. D.P. Maher, "Crypto backup and key escrow," Communications of ACM, Vol. 39, No. 3, pp. 48-53, 1996.
[5]. J. Kennedy, S.M. Matyas and N. Zunic, "Key recovery functional model," Computers and Security, Vol. 19, pp. 31-36, 2000.
[6]. J. Nieto, K. Viswanathan, C. Boyd, and E. Dawson, "Key recovery system for the commercial environment, " In Australasian Conference for Information Security and Privacy, ACISP 2000, Lecture Notes in Computer Science, Vol. 1841, Springer-Verlag, pp. 149-162, 2000.
[7]. J. Nieto, K. Viswanathan, C. Boyd, A. Clark, and E. Dawson, "Key recovery for the commercial environment," International Journal of Information Security 2002, Vol. 1, No. 3, pp. 161-174, 2002.
[8]. L. Lamport, "Password authentication with insecure communication," Communications of ACM, Vol. 24, No. 11, pp. 770-772, Nov. 1981.
[9]. M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attack," Advances in Cryptology-EUROCRYPT 2000, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag, pp. 139-155, 2000.
[10]. M. Burmester and Y. Desmedt, "A Secure and Efficient Conference Key Distribution System (Extended Abstract)," Advances in Cryptology-EUROCRYPT 1994, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag, pp. 275-286, 1995.
[11]. R. Gennaro, P. Karger, S. Matyas, M. Peyravian, A. Roginsky, D. Safford, M. Willet, and N. Zunic, "Two-phase cryptographic key recovery system," Computers and Security, No. 16, pp. 681-506, 1997.
[12]. R.L. Rivest, "The MD5 message digest algorithm," RFC 1321, April 1992.
[13]. R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," Communications of ACM, Vol. 21, No. 2, pp. 120-126, 1978.
[14]. S.T. Walker, S.B. Lipner, C.M. Ellison, and D.M. Balenson, "Commercial Key Recovery," Communications of ACM, Vol. 39, No. 3, pp. 41-47, 1996.
[15]. S.M. Bellovin and M. Merritt, "Encrypted key exchange: password-based protocols secure against dictionary attacks," Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72-84, May 1992.
[16]. Sung-Ming Yen, "Practical Key Recovery Schemes", In Australasian Conference for Information Security and Privacy, ACISP 2001, Lecture Notes In Computer Science, Vol. 2119, Springer-Verlag, pp. 104-114, 2001.
[17]. T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, Vol. IT-31, No. 4, pp. 469-472, July 1985.
[18]. T. Wu, "The Secure Remote Password Protocol," in Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, San Diego, CA, pp. 97-111, Mar 1998..
[19]. T. Wu, "SRP-6: Improvements and Refinements to the Secure Remote Password Protocol," Submission to the IEEE P1363 Working Group, Oct 2002.
[20]. W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No. 6, pp. 644-654, 1976.
[21]. X. Zou and B. Ramamurthy, "A simple group Diffie-Hellman key agreement protocol without member serialization", Computer and Information Science, CIS 2004, Lecture Notes in Computer Science, Vol. 3314, Springer-Verlag, pp. 725-731, 2004.
[22]. Yoon-Jung Rhee and Tai-Yun Kim, "Practical Solutions to Key Recovery Based on PKI in IP Security," SAFECOMP 2002, Lecture Notes in Computer Science, Vol. 2434, Springer-Verlag, pp. 44-52 2000.
[23]. FIPS PUB 185, "Escrowed Encryption Standard," US Department of Commerce, February 1994.
[24]. FIPS 180-1, "Secure Hash Standard," NIST, US Department of Commerce, Washington D.C., April 1995.
[25]. NIST, Govt. of U.S.A., "Requirement for key recovery products, " Report of the Technical Advisory Committee to develop a federal information processing standard for federal key management infrastructure, Nov. 1998, available at http://csrc.nist.gov/keyrecovery/ .
[26]. The GNU Privacy Guard-GnuPG.org, http://www.gnupg.org/
[27]. M. Ashley, "The GNU Privacy Handbook," The Free Software Foundation, Inc., 1999. http://www.gnupg.org/gph/en/manual.pdf
[28]. W. Koch, "The GNU Privacy Guard Manual," The Free Software Foundation, Inc., March 2007. http://www.gnupg.org/(en)/documentation/manuals/gnupg.pdf,
[29]. The SSL Protocol, http://www.webstart.com/jed/papers/HRM/references/ssl.html
[30]. The Stanford SRP Authentication Project, http://srp.stanford.edu/
[31]. One-time password, http://en.wikipedia.org/wiki/One-time_password, From Wikipedia, the free encyclopedia.
[32]. Cygwin, http://www.cygwin.com/
[33]. PGP Corporation, http://www.pgp.com/
[34]. 林幸君,「適用電子商務環境之金鑰恢復與託管機制研究」,大葉大學資訊管理學系碩士班,民國92年。
[35]. 張明聖,「商業性金鑰恢復與金鑰託管機制之研究」,中央大學資訊工程研究所碩士論文,民國90 年。 |