-
2
-
-
85029538003
-
UEPS-A Second Generation Electronic Wallet
-
Lecture Notes in Computer Science, vol. 648 Springer-Verlag, New York
-
Anderson, R.J. UEPS-A Second Generation Electronic Wallet. In Computer Security-ESORICS 92. Lecture Notes in Computer Science, vol. 648 Springer-Verlag, New York, pp. 411-418.
-
Computer Security-ESORICS
, vol.92
, pp. 411-418
-
-
Anderson, R.J.1
-
5
-
-
0027804413
-
Information systems security design methods: implications for information systems development
-
(Dec.)
-
Baskerville, R. Information systems security design methods: implications for information systems development. ACM Computing Surveys 25, 4 (Dec. 1993), 375-414.
-
(1993)
ACM Computing Surveys
, vol.25
, Issue.4
, pp. 375-414
-
-
Baskerville, R.1
-
6
-
-
84976807408
-
Limitations of logical analysis of cryptographic protocols
-
93, pp. T88-T96
-
Boyd, C., and Mao, W.B. Limitations of logical analysis of cryptographic protocols. In Pre-Proceedings of Eurocrypt 93, pp. T88-T96.
-
Pre-Proceedings of Eurocrypt
-
-
Boyd, C.1
Mao, W.B.2
-
8
-
-
85029502150
-
Towards security in an open systems federation
-
Lecture Notes in Computer Science, Springer-Verlag, New York
-
Bull, J.A., Gong, L., and Sollins, K. Towards security in an open systems federation. In Proceedings of ESORICS 92. Lecture Notes in Computer Science, vol. 648. Springer-Verlag, New York, pp. 3-20.
-
Proceedings of ESORICS 92
, vol.648
, pp. 3-20
-
-
Bull, J.A.1
Gong, L.2
Sollins, K.3
-
9
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., and Needham, R.M. A logic of authentication. In Proceedings of the Royal Society of London A, vol. 426, 1989, pp. 233-271.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
10
-
-
84916516522
-
The infeasibility of experimental quantification of life-critical software reliability
-
New Orleans, La., Dec., pp. 00-7 b
-
Butler, R.W., and Finelli, G.B. The infeasibility of experimental quantification of life-critical software reliability. In Proceedings of the ACM Symposium on Software for Critical Systems. New Orleans, La., Dec. 1991, pp. 00-7 b.
-
(1991)
Proceedings of the ACM Symposium on Software for Critical Systems
-
-
Butler, R.W.1
Finelli, G.B.2
-
11
-
-
84976777647
-
A rigorous approach to determining objects
-
IEEE
-
Faigin, D.P., Donndelinger, J.J., and Jones, J.R. A rigorous approach to determining objects. In Proceedings of the 9th Annual Computer Security Applications Conference, IEEE, 1993, pp. 159-168.
-
(1993)
Proceedings of the 9th Annual Computer Security Applications Conference
, pp. 159-168
-
-
Faigin, D.P.1
Donndelinger, J.J.2
Jones, J.R.3
-
12
-
-
84976798000
-
Thoughts on cryptographic protocols
-
Lecture Notes in Computer Science. Springer-Verlag, New York. To be published.
-
Gong, E. Thoughts on cryptographic protocols. In Proceedings of the 1993 Cambridge Protocols Workshop. Lecture Notes in Computer Science. Springer-Verlag, New York. To be published.
-
Proceedings of the 1993 Cambridge Protocols Workshop
-
-
Gong, E.1
-
16
-
-
12844284330
-
A taxonomy of computer program security flaws, with examples
-
U.S. Naval Research Laboratory report NRL/FR/5542-93-9591
-
Landwehr, C.E., Bull, A.R., McDermou. J.P., and Choi, W.S. A taxonomy of computer program security flaws, with examples. U.S. Naval Research Laboratory report NRL/FR/5542-93-9591.
-
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermou, J.P.3
Choi, W.S.4
-
17
-
-
84970869530
-
How to rob a bank the cash-card way
-
25 April
-
Lewis. B. How to rob a bank the cash-card way, The Sunday Telegraph, 25 April 1993, p. 5.
-
(1993)
The Sunday Telegraph
, pp. 5
-
-
Lewis, B.1
-
18
-
-
84976856272
-
Sir Humphrey fudges his half-reforms
-
17 July, sec. 4
-
Macrae, N. Sir Humphrey fudges his half-reforms. The Sunday Times 17 July 1994, sec. 4, p. 4.
-
(1994)
The Sunday Times
, pp. 4
-
-
Macrae, N.1
-
23
-
-
1842531284
-
-
Technical report TR-244, School of Computer Science, Carleton University, Ottawa. May
-
Wiener, M.J. Efficient DES Key Search, Technical report TR-244, School of Computer Science, Carleton University, Ottawa. May 1994.
-
(1994)
Efficient DES Key Search
-
-
Wiener, M.J.1
|