-
1
-
-
0012341121
-
The classification of hash func-tions
-
De-cember
-
R. Anderson, The classification of hash func-tions. Cryptography and Coding IV, pp. 83-94, De-cember 1993.
-
(1993)
Cryptography and Coding IV
, pp. 83-94
-
-
Anderson, R.1
-
2
-
-
85084162426
-
Security of web browser scripting languages: Vulnerabilities, at-tacks, and remedies
-
V. Anupam, A. Mayer, Security of web browser scripting languages: Vulnerabilities, at-tacks, and remedies. In Proc. 7th USENIX Security Symposium, 1998.
-
(1998)
Proc. 7th USENIX Security Symposium
-
-
Anupam, V.1
Mayer, A.2
-
3
-
-
85094860360
-
-
The Anonymizer
-
The Anonymizer. http://www.anonym-izer.com.
-
-
-
-
5
-
-
84983089516
-
The security of cipher block chaining
-
Springer Verlag LNCS
-
M. Bellare, J. Kilian, P. Rogaway, The security of cipher block chaining. Advances in cryp-tology-CRYPTO'94, Springer Verlag LNCS 839, pp. 341-358.
-
Advances in cryp-tology-CRYPTO'94
, vol.839
, pp. 341-358
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms. Communica-tions of the ACM, 24(2), 1981, pp. 84-88.
-
(1981)
Communica-tions of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obso-lete
-
Octo-ber
-
D. Chaum, Security without identification: Transaction systems to make big brother obso-lete. Communications of the ACM, 28(10), Octo-ber 1985, pp. 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
10
-
-
0003317098
-
How to make personalized web brows-ing simple, secure, and anonymous
-
Springer-Verlag LNCS 1318
-
E. Gabber, P.B. Gibbons, Y. Matias, A. Mayer, How to make personalized web brows-ing simple, secure, and anonymous. Financial Cryptography'97, Springer-Verlag LNCS 1318.
-
Financial Cryptography'97
-
-
Gabber, E.1
Gibbons, P.B.2
Matias, Y.3
Mayer, A.4
-
14
-
-
0043256689
-
-
Submitted for publication
-
D.M. Kristol, E. Gabber, P.B. Gib-bons, Y. Matias, A. Mayer, Design and imple-mentation of the Lucent Personalized Web Assis-tant (LPWA). Submitted for publication.
-
Design and imple-mentation of the Lucent Personalized Web Assis-tant (LPWA)
-
-
Kristol, D.M.1
Gabber, E.2
Gib-bons, P.B.3
Matias, Y.4
Mayer, A.5
-
15
-
-
85028910917
-
Markov ciphers and dif-ferential cryptanalysis
-
Springer Verlag LNCS
-
X. Lai, J. Massey, Markov ciphers and dif-ferential cryptanalysis. In Proc. EUROCRYPT'91, Springer Verlag LNCS 437, pp. 17-38.
-
Proc. EUROCRYPT'91
, vol.437
, pp. 17-38
-
-
Lai, X.1
Massey, J.2
-
18
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
Springer-Verlag LNCS
-
B. Preneel, P.C. van Oorschot, MDx-MAC and building fast MACs from hash functions. Crypto'95, Springer-Verlag LNCS 963, pp. 1-14.
-
Crypto'95
, vol.963
, pp. 1-14
-
-
Preneel, B.1
van Oorschot, P.C.2
-
19
-
-
84937555451
-
Networks with-out user observability-design options. Euro-crypt'85
-
Springer-Verlag LNCS
-
A. Pfitzmann, M. Waidner, Networks with-out user observability-design options. Euro-crypt'85, Springer-Verlag LNCS 219, pp. 245-253.
-
, vol.219
, pp. 245-253
-
-
Pfitzmann, A.1
Waidner, M.2
-
21
-
-
84948990100
-
The RC5 encryption algorithm
-
Springer Verlag LNCS
-
R. Rivest, The RC5 encryption algorithm. Fast Software Encryption, Springer Verlag LNCS 1008, pp. 86-96, 1995.
-
(1995)
Fast Software Encryption
, vol.1008
, pp. 86-96
-
-
Rivest, R.1
-
23
-
-
24344440124
-
Anonymous communication and anonymous cash
-
Springer Verlag LNCS
-
D. Simon, Anonymous communication and anonymous cash. Crypto'96, Springer Verlag LNCS 1109, pp. 61-73.
-
Crypto'96
, vol.1109
, pp. 61-73
-
-
Simon, D.1
-
25
-
-
85094868171
-
-
ssl-faq at http://www.consensus.com/ security/ssl-Talk-sec03.html.
-
-
-
|