-
3
-
-
0033313663
-
Accountable anonymous access to services in mobile communication systems
-
Buttyan L, Hubaux J. Accountable anonymous access to services in mobile communication systems. In: Symposium on Reliable Distributed Systems, 1999:384-389.
-
(1999)
Symposium on Reliable Distributed Systems
, pp. 384-389
-
-
Buttyan, L.1
Hubaux, J.2
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communication of the ACM, 1981; 24(2):84-88.
-
(1981)
Communication of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
3543127731
-
-
Excellent E-service. http://www.excellenteservice.com, 2002.
-
(2002)
-
-
-
6
-
-
0029360131
-
Security issues in a CDPD wireless network
-
Frankel Y, Herzberg A, Karger P. Krawczyk H, Kunzinger C, Yung M. Security issues in a CDPD wireless network. IEEE Personal Communication, 1995.
-
(1995)
IEEE Personal Communication
-
-
Frankel, Y.1
Herzberg, A.2
Karger, P.3
Krawczyk, H.4
Kunzinger, C.5
Yung, M.6
-
7
-
-
84958780603
-
Authentication and payment in future mobile systems
-
Quisquater J. et al. eds. Lecture Notes in Computer Science, Springer-Verlag
-
Horn G, Preneel B. Authentication and payment in future mobile systems. In: Quisquater J. et al. eds. Proceedings European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Springer-Verlag, 1998;1485:277-293.
-
(1998)
Proceedings European Symposium on Research in Computer Security
, vol.1485
, pp. 277-293
-
-
Horn, G.1
Preneel, B.2
-
11
-
-
24944561275
-
Configured replication for mobile applications
-
Lubinski A, Heuer A. Configured replication for mobile applications. Rostocker Informatik Berichte, 2000; 24:101-112.
-
(2000)
Rostocker Informatik Berichte
, vol.24
, pp. 101-112
-
-
Lubinski, A.1
Heuer, A.2
-
12
-
-
22044447040
-
Secure billing for mobile information services in UMTS
-
Lecture Notes in Computer Science, Springer-Verlag
-
Martin K, Preneel B, Mitchell C, Hitz H, Poliakova A, Howard P. Secure billing for mobile information services in UMTS. In: Proceedings 5th International Conference on Intelligence in Services and Networks'98, Lecture Notes in Computer Science, Springer-Verlag, 1998; 1430:535-548.
-
(1998)
Proceedings 5th International Conference on Intelligence in Services and Networks'98
, vol.1430
, pp. 535-548
-
-
Martin, K.1
Preneel, B.2
Mitchell, C.3
Hitz, H.4
Poliakova, A.5
Howard, P.6
-
14
-
-
0032124041
-
Mobility and security management in the GSM system and some proposed future improvements
-
Mehrotra A, Golding L. Mobility and security management in the GSM system and some proposed future improvements. In: Proceedings of IEEE, 1998; 86(7).
-
(1998)
Proceedings of IEEE
, vol.86
, Issue.7
-
-
Mehrotra, A.1
Golding, L.2
-
15
-
-
34547330729
-
RBAC on the Web by smart certificates
-
Fairfax, VA, USA
-
Park J, Sandhu S. RBAC on the Web by Smart Certificates. In: ACM Workshop on Role-Based Access Control, Fairfax, VA, USA, 1999:1-9.
-
(1999)
ACM Workshop on Role-based Access Control
, pp. 1-9
-
-
Park, J.1
Sandhu, S.2
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-Key cryptosystems
-
Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-Key cryptosystems. Communication of the ACM, 1978;21(2):120-126.
-
(1978)
Communication of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
19
-
-
22644452167
-
Anonymous authentication of membership in dynamic groups
-
Anguilla: British West Indies, February
-
Schechter S, Parnell T, Hartemink A. Anonymous Authentication of Membership in Dynamic Groups. In: Financial Cryptography '99, Anguilla: British West Indies, February 1999.
-
(1999)
Financial Cryptography '99
-
-
Schechter, S.1
Parnell, T.2
Hartemink, A.3
-
21
-
-
0348151886
-
Better login protocols for computer networks
-
Vandewalle J. ed., Lecture Notes in Computer Science, Toulouse, France, Springer-Verlag
-
Waleffe DD, Quisquater JJ. Better login protocols for computer networks. In: Vandewalle J. ed., Proceedings European Symposium on Research in Computer Security, Lecture Notes in Computer Science, Toulouse, France, Springer-Verlag, 1990.
-
(1990)
Proceedings European Symposium on Research in Computer Security
-
-
Waleffe, D.D.1
Quisquater, J.J.2
-
23
-
-
84962890350
-
Untraceable off-line electronic cash flow in e-Commerce
-
Australia, IEEE Computer Society
-
Wang H, Zhang Y. Untraceable off-line electronic cash flow in e-Commerce. In: Proceedings of the 24th Australian Computer Science Conference ACSC2001, GoldCoast, Australia, IEEE Computer Society, 2001:191-198.
-
(2001)
Proceedings of the 24th Australian Computer Science Conference ACSC2001, GoldCoast
, pp. 191-198
-
-
Wang, H.1
Zhang, Y.2
-
24
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
San Diego, CA
-
Wilhelm U, Staamann S, Buttyan L. On the problem of trust in mobile agent systems. In: IEEE Network and Distributed Systems Security Symposium, San Diego, CA, 1998:11-13.
-
(1998)
IEEE Network and Distributed Systems Security Symposium
, pp. 11-13
-
-
Wilhelm, U.1
Staamann, S.2
Buttyan, L.3
|