-
1
-
-
84949278230
-
-
October 7, CAFE (Esprit 7023) Deliverable IHS 8341 (confidential), Septemberl, 1995. [BCMM_95]
-
[BCMM_95] Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Cristian Radu, Peter de Rooij, Berry Schoenmakers, Matthias Schunter: Functionality of the Basic Protocols; CAFE Public Report IHS8341, CWI Amsterdam, October 7, 1995; CAFE (Esprit 7023) Deliverable IHS 8341 (confidential), Septemberl, 1995.
-
(1995)
Functionality of the Basic Protocols; CAFE Public Report IHS8341, CWI Amsterdam
-
-
Bosselaers, A.1
Cramer, R.2
Michelsen, R.3
Mjølsnes, S.4
Muller, F.5
Pedersen, T.6
Pfitzmann, B.7
Radu, C.8
de Rooij, P.9
Schoenmakers, B.10
Schunter, M.11
-
2
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
[Chau_81]
-
[Chau_81] D. Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24/2 (1981) 84-88.
-
(1981)
Communications of the ACM
, vol.24-2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
0022145479
-
Security without Identification: Transaction Systems to make Big Brother Obsolete
-
[Chau_85]
-
[Chau_85] D. Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) 1030-1044.
-
(1985)
Communications of the ACM
, vol.28-10
, pp. 1030-1044
-
-
Chaum, D.1
-
4
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untracebility
-
[Chau_88]
-
[Chau_88] D. Chaum: The Dining Cryptographers Problem: Unconditional Sender and Recipient Untracebility. Journal of Cryptology 1/1 (1988) 65-75.
-
(1988)
Journal of Cryptology
, vol.1-1
, pp. 65-75
-
-
Chaum, D.1
-
5
-
-
85031542311
-
Mixing Email with BABEL
-
San Diego, IEEE Comput. Soc. Press, [GüTs_96]
-
[GüTs_96] C. Gülcü, G. Tsudik: Mixing Email with BABEL; Proc. Symposium on Networking and Distributed System Security, San Diego, IEEE Comput. Soc. Press, 1996, pp 2-16.
-
(1996)
Proc. Symposium on Networking and Distributed System Security
, pp. 2-16
-
-
Gülcü, C.1
Tsudik, G.2
-
6
-
-
0343023009
-
Location management strategies increasing privacy in mobile communication
-
Chapman & Hall, London [FJKP_96]
-
[FJKP_96] Dogan Kesdogan, Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Location management strategies increasing privacy in mobile communication; 12th IFIP International Conference on Information Security (IFIP/Sec '96), Chapman & Hall, London 1996, 39-48.
-
(1996)
12th IFIP International Conference on Information Security (IFIP/Sec '96)
, pp. 39-48
-
-
Kesdogan, D.1
Federrath, H.2
Jerichow, A.3
Pfitzmann, A.4
-
8
-
-
84949278231
-
-
Security Protocols Workshop, 10.-12.4.1996, Cambridge, UK, proceedings to appear in LNCS, Springer-Verlag. [Pede_96]
-
[Pede_96] Torben P. Pedersen: Electronic Payments of Small Amounts. 1996 Security Protocols Workshop, 10.-12.4.1996, Cambridge, UK, proceedings to appear in LNCS, Springer-Verlag.
-
(1996)
Electronic Payments of Small Amounts
-
-
Pedersen, T.P.1
-
9
-
-
0003056522
-
ISDN-MIXes-Untraceable Communication with Very Small Bandwidth Overhead
-
Elsevier, Amsterdam [PfPW91]
-
[PfPW91] A. Pfitzmann, B. Pfitzmann, M. Waidner: ISDN-MIXes-Untraceable Communication with Very Small Bandwidth Overhead. 7th IFIP International Conference on Information Security (IFIP/Sec '91), Elsevier, Amsterdam 1991, 245-258.
-
(1991)
7th IFIP International Conference on Information Security (IFIP/Sec '91)
, pp. 245-258
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
-
10
-
-
0023331864
-
Networks without user observability-design options
-
LNCS 219, Springer-Verlag, Berlin 1986, 245-253; Extended version in: Computers & Security [PfWa86]
-
[PfWa86] A. Pfitzmann, M. Waidner: Networks without user observability-design options; Eurocrypt '85, LNCS 219, Springer-Verlag, Berlin 1986, 245-253; Extended version in: Computers & Security 6/2 (1987) 158-166.
-
(1987)
Eurocrypt '85
, vol.6-2
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
11
-
-
84874912397
-
-
IBM Research Report RZ 2784 (##89262) 02/05/96, IBM Research Division, Zürich, Feb. [PPSW_96]
-
[PPSW_96] Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, Michael Waidner: Mobile User Devices and Security Modules: Design for Trustworthiness; IBM Research Report RZ 2784 (##89262) 02/05/96, IBM Research Division, Zürich, Feb. 1996.
-
(1996)
Mobile User Devices and Security Modules: Design for Trustworthiness
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
12
-
-
0003851399
-
-
John Wiley & Sons, Inc., [Schn_96]
-
[Schn_96] Bruce Schneier: Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley & Sons, Inc., p. 53, 1996.
-
(1996)
Applied Cryptography Second Edition: Protocols, algorithms, and source code in C
-
-
Schneier, B.1
|