-
2
-
-
85029538003
-
-
92, Springer Lecture Notes in Computer Science, vol. 648, pp 411-418, 1992.
-
R.J. Anderson, "UEPS - A Second Generation Electronic Wallet," Computer Security-ESORICS 92, Springer Lecture Notes in Computer Science, vol. 648, pp 411-418, 1992.
-
"UEPS - a Second Generation Electronic Wallet," Computer Security-ESORICS
-
-
Anderson, R.J.1
-
3
-
-
0028532579
-
-
37, no. 11, pp. 32-40, Nov. 1994.
-
R.J. Anderson, "Why Cryptosystems Fail," Comm. ACM, vol. 37, no. 11, pp. 32-40, Nov. 1994.
-
"Why Cryptosystems Fail," Comm. ACM, Vol.
-
-
Anderson, R.J.1
-
4
-
-
33747333669
-
-
94, Springer Lecture Notes in Computer Science, vol. 875, pp. 231-245, 1994.
-
R.J. Anderson, "Liability and Computer Security-Nine Principles," Proc. ESORICS 94, Springer Lecture Notes in Computer Science, vol. 875, pp. 231-245, 1994.
-
"Liability and Computer Security-Nine Principles," Proc. ESORICS
-
-
Anderson, R.J.1
-
5
-
-
33747337043
-
-
27, no. 4, pp. 108-121, 1977.
-
K. Appel and W. Haken, "The Solution to the Four Color Problem," Scientific American, vol. 27, no. 4, pp. 108-121, 1977.
-
And W. Haken, "The Solution to the Four Color Problem," Scientific American, Vol.
-
-
Appel, K.1
-
10
-
-
33747356288
-
-
426, pp 233-271, 1989.
-
M. Burrows, M. Abadi, and R.M. Needham, "A Logic of Authentication," Proc. Royal Society of London A, vol. 426, pp 233-271, 1989.
-
M. Abadi, and R.M. Needham, "A Logic of Authentication," Proc. Royal Society of London A, Vol.
-
-
Burrows, M.1
-
13
-
-
33747367521
-
-
267, no. 2, pp 76-81, Aug. 1992.
-
D. Chaum, "Encrypted IDs for Digital Privacy," Scientific American, vol. 267, no. 2, pp 76-81, Aug. 1992.
-
"Encrypted IDs for Digital Privacy," Scientific American, Vol.
-
-
Chaum, D.1
-
14
-
-
33747352059
-
-
228, no. 5, pp. 15-23, May 1973.
-
H. Feistel, "Cryptography and Data Security," Scientific American, vol. 228, no. 5, pp. 15-23, May 1973.
-
"Cryptography and Data Security," Scientific American, Vol.
-
-
Feistel, H.1
-
16
-
-
33747330418
-
-
165-168, IEEE, 1992.
-
G.J. Kuhn, "The Use of Secret-key Techniques in Forward Information Verification," Prof. South African COMSIG, pp. 165-168, IEEE, 1992.
-
"The Use of Secret-key Techniques in Forward Information Verification," Prof. South African COMSIG, Pp.
-
-
Kuhn, G.J.1
-
17
-
-
33747378117
-
-
94, Lille, France, 1994.
-
P. Macs, "Gemplus," invited talk at Cardis 94, Lille, France, 1994.
-
"Gemplus," Invited Talk at Cardis
-
-
Macs, P.1
|