Facets (new session)
Description
Metadata
Settings
owl:sameAs
Inference Rule:
asEquivalent
b3s
b3sifp
facets
ldp
oplweb
skos-trans
virtrdf-label
virtrdf-url
None
About:
A method for obtaining digital signatures and public-key cryptosystems
Goto
Sponge
NotDistinct
Permalink
An Entity of Type :
wikibase:Item
, within Data Space :
wikidata.demo.openlinksw.com
associated with source
document(s)
Type:
Item
New Facet based on Instances of this Class
article
Attributes
Values
rdf:type
Item
description
article
(en)
ലേഖനം
(ml)
artikull shkencor
(sq)
artículu científicu
(ast)
vědecký článek
(cs)
wetenschappelijk artikel
(nl)
գիտական հոդված
(hy)
գիտական յօդուած
(hyw)
наукова стаття, опублікована в 1978
(uk)
article de Rivest, Shamir et Adleman publié en février 1978 dans Communications of the ACM
(fr)
wissenschaftlicher Artikel aus "Communications of the ACM"
(de)
publication date
wds:Q27177229-216b5f61-4f5e-956f-8c2a-402bc708c8ca
publication date
1978-02-01 00:00:00Z
(
xsd:dateTime
)
language of work or name
wds:Q27177229-62B12E0B-14A3-4A84-962B-4C4428232198
language of work or name
English
OpenCitations bibliographic resource ID
wds:Q27177229-EB43C847-A1AB-4CBC-BDEB-885619DD87A4
OpenCitations bibliographic resource ID
https://w3id.org/oc/corpus/br/1495267
OpenCitations bibliographic resource ID
1495267
rdfs:label
A method for obtaining digital signatures and public-key cryptosystems
(en)
A method for obtaining digital signatures and public-key cryptosystems
(fr)
A method for obtaining digital signatures and public-key cryptosystems
(nl)
A method for obtaining digital signatures and public-key cryptosystems
(ast)
A method for obtaining digital signatures and public-key cryptosystems / Ronald L. Rivest, Adi Shamir, Leonard Adleman. - (1978)
(de)
skos:prefLabel
A method for obtaining digital signatures and public-key cryptosystems
(en)
A method for obtaining digital signatures and public-key cryptosystems
(fr)
A method for obtaining digital signatures and public-key cryptosystems
(nl)
A method for obtaining digital signatures and public-key cryptosystems
(ast)
A method for obtaining digital signatures and public-key cryptosystems / Ronald L. Rivest, Adi Shamir, Leonard Adleman. - (1978)
(de)
name
A method for obtaining digital signatures and public-key cryptosystems
(en)
A method for obtaining digital signatures and public-key cryptosystems
(fr)
A method for obtaining digital signatures and public-key cryptosystems
(nl)
A method for obtaining digital signatures and public-key cryptosystems
(ast)
A method for obtaining digital signatures and public-key cryptosystems / Ronald L. Rivest, Adi Shamir, Leonard Adleman. - (1978)
(de)
author
wds:Q27177229-0A2A68C0-BE0D-440D-B540-45F4D061F268
wds:Q27177229-7C25D90F-D8CF-4837-A092-26D43A86E003
wds:Q27177229-F2623D16-2418-41A4-A315-7BAF3A4607B0
author
Ron Rivest
Leonard Adleman
Adi Shamir
title
wds:Q27177229-A5F9699E-DF4D-4878-BF9C-2E1F5DE076FC
title
A method for obtaining digital signatures and public-key cryptosystems
(en)
instance of
wds:Q27177229-B9A9E3E6-8994-424C-8709-5137BF774BB3
instance of
scholarly article
DBLP publication ID
wds:Q27177229-0CE8501A-F5E1-4623-818B-107E70285718
DBLP publication ID
https://dblp.org/rec/journals/cacm/RivestSA78
DBLP publication ID
journals/cacm/RivestSA78
published in
wds:Q27177229-62046210-8757-4175-9E45-0AD56D1C8DD8
full work available at URL
wds:Q27177229-BDA758E8-937A-43AD-B2AC-B74838B1194A
published in
Communications of the ACM
full work available at URL
http://people.csail.mit.edu/rivest/Rsapaper.pdf
DOI
wds:Q27177229-F3BBF0F8-5824-4A10-9485-19B2688A02E9
DOI
http://dx.doi.org/10.1145/359340.359342
DOI
10.1145/359340.359342
ResearchGate publication ID
wds:Q27177229-D7BA5EB8-C0E9-45F3-99F4-177CC559B8C2
ResearchGate publication ID
220426448
ORKG ID
wds:Q27177229-1bcc56f3-4002-4dff-982e-a24bb9dbc9b7
ORKG ID
R75432
is
about
of
https://www.wikidata.org/wiki/Special:EntityData/Q27177229
is
cites work
of
Medical image security in a HIPAA mandated PACS environment
How to share a secret
How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design
Demonstration of a Fundamental Quantum Logic Gate
Secure Dynamic access control scheme of PHR in cloud computing
New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing.
An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.
Zero-Knowledge Proofs of Identity
A survey of research progress and development tendency of attribute-based encryption
Algorithms, complexity, and the sciences
Data security and protection in cross-institutional electronic patient records
Redactable signatures for signed CDA Documents
Privacy-Preserving Location-Based Service Scheme for Mobile Sensing Data
Network and data security design for telemedicine applications
How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure.
Secure quantum key distribution
Security of quantum digital signatures for classical messages
Location-aware dynamic session-key management for grid-based Wireless Sensor Networks
A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.
On the security of a dynamic ID-based authentication scheme for telecare medical information systems
General immunity and superadditivity of two-way Gaussian quantum cryptography
Security protection of DICOM medical images using dual-layer reversible watermarking with tamper detection capability
Irreversible encryption method by generation of polynomials.
Cloud-based privacy-preserving remote ECG monitoring and surveillance.
Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem
An Embedded Sensor Node Microcontroller with Crypto-Processors
A security framework for nationwide health information exchange based on telehealth strategy
A secure integrated medical information system
Secure key-exchange protocol with an absence of injective functions
RFC 7670: Generic Raw Public-Key Support for IKEv2
Complex architecture of primes and natural numbers.
A Simple Unpredictable Pseudo-Random Number Generator
Efficient security mechanisms for mHealth applications using wireless body sensor networks
Quantum algorithms for algebraic problems
RFC 8446: The Transport Layer Security (TLS) Protocol Version 1.3
RUASN: a robust user authentication framework for wireless sensor networks
1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks
Quantum algorithms: an overview
Idea: Towards a Working Fully Homomorphic Crypto-processor
A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
◂◂ First
◂ Prev
Next ▸
Last ▸▸
Page 1 of 4
Go
Faceted Search & Find service v1.16.117 as of May 05 2024
Alternative Linked Data Documents:
ODE
Content Formats:
RDF
ODATA
Microdata
About
OpenLink Virtuoso
version 07.20.3239 as of May 5 2024, on Linux (x86_64-centos_6-linux-gnu), Single-Server Edition (378 GB total memory, 183 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2025 OpenLink Software