-
3
-
-
0034581037
-
Ten risks of PKI: What you're not being told about Public Key Infrastructure
-
Carl Ellison and Bruce Schneier. Ten risks of PKI: What you're not being told about Public Key Infrastructure. Computer Security Journal, 16(1):1-7, 2000.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
5
-
-
0013194031
-
-
June
-
J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen, and L. Stewart. RFC 2617: HTTP Authentication: Basic and Digest Access Authentication, June 1999.
-
(1999)
RFC 2617: HTTP Authentication: Basic and Digest Access Authentication
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
7
-
-
33645694345
-
KSSL: Experiments in wireless internet security
-
Sun Microsystems, Inc, Santa Clara, California, USA, November
-
Vipul Gupta and Sumit Gupta. KSSL: Experiments in Wireless Internet Security. Technical Report TR-2001-103, Sun Microsystems, Inc, Santa Clara, California, USA, November 2001.
-
(2001)
Technical Report
, vol.TR-2001-103
-
-
Gupta, V.1
Gupta, S.2
-
8
-
-
84858578509
-
-
D. Hugo. FExplorer Web Site, http://users.skynet.be/domi/fexplorer.htm.
-
-
-
Hugo, D.1
-
9
-
-
0347568494
-
J2me application-layer end-to-end security for m-commerce
-
January
-
Wassim Itani and Ayman Kayssi. J2me application-layer end-to-end security for m-commerce. Journal of Network and Computer Applications, 27(1): 13-32, January 2004.
-
(2004)
Journal of Network and Computer Applications
, vol.27
, Issue.1
, pp. 13-32
-
-
Itani, W.1
Kayssi, A.2
-
10
-
-
0003518498
-
-
The Java Series. Addison-Wesley, Boston, Mass.
-
G. Steele J. Gosling, B. Joy and G. Bracha. The Java Language Specification Second Edition. The Java Series. Addison-Wesley, Boston, Mass., 2000.
-
(2000)
The Java Language Specification Second Edition
-
-
Steele, G.1
Gosling, J.2
Joy, B.3
Bracha, G.4
-
19
-
-
0012855289
-
Connected, limited device configuration. Specification version 1.0, Java 2 platform micro edition
-
Sun MicroSystems, California, USA, May
-
Sun MicroSystems. Connected, Limited Device Configuration. Specification Version 1.0, Java 2 Platform Micro Edition. Technical report, Sun MicroSystems, California, USA, May 2000.
-
(2000)
Technical Report
-
-
-
20
-
-
14744284305
-
KVM porting guide
-
Sun MicroSystems, California, USA, September
-
Sun MicroSystems. KVM Porting Guide. Technical report, Sun MicroSystems, California, USA, September 2001.
-
(2001)
Technical Report
-
-
-
21
-
-
84889264773
-
-
Nokia. Series 60 Platform, http://www.nokia.eom/nokia/0,8764,46827,00.html.
-
Series 60 Platform
-
-
-
24
-
-
84858582402
-
-
Phenoelit Hackers Group, http://www.phenoelit.de/, 2003.
-
(2003)
-
-
-
25
-
-
33645685968
-
-
Addison-Wesley, Reading, MA, USA
-
Roger Riggs, Antero Taivalsaari, Mark VandenBrink, and Jim Holliday. Programming wireless devices with the Java 2 platform, micro edition: J2ME Connected Limited Device Configuration (CLDC), Mobile Information Device Profile (MIDP). Addison-Wesley, Reading, MA, USA, 2001.
-
(2001)
Programming Wireless Devices with the Java 2 Platform, Micro Edition: J2ME Connected Limited Device Configuration (CLDC), Mobile Information Device Profile (MIDP)
-
-
Riggs, R.1
Taivalsaari, A.2
VandenBrink, M.3
Holliday, J.4
-
28
-
-
84858579464
-
-
Bug 4959337, November
-
Bug 4959337: RSA Division by Zero, http://bugs.sun.com/bugdatabase/view_bug.do?bug_id=4959337, November 2003.
-
(2003)
RSA Division by Zero
-
-
-
32
-
-
84858583873
-
-
October
-
Sun Microsystems. KNI Specification K Native Interface (KNI) 1.0. http://www.carfield.com.hk/java_store/j2me/j2me_cldc/doc/kni/html/index.html, October 2002.
-
(2002)
KNI Specification K Native Interface (KNI) 1.0
-
-
-
35
-
-
84860081117
-
The legion of the bouncy castle
-
The Legion of the Bouncy Castle. Bouncy Castle Cryptography API. http://www.bouncycastle.org, 2004.
-
(2004)
Bouncy Castle Cryptography API
-
-
|