메뉴 건너뛰기




Volumn 3995 LNCS, Issue , 2006, Pages 1-13

Multilateral security: Enabling technologies and their evaluation

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMMUNICATION SYSTEMS; INFORMATION RETRIEVAL SYSTEMS; RESEARCH AND DEVELOPMENT MANAGEMENT;

EID: 33746644570     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11766155_1     Document Type: Conference Paper
Times cited : (10)

References (25)
  • 1
    • 0031238209 scopus 로고    scopus 로고
    • The state of the art in electronic payment systems
    • N. Asokan, Phillipe A. Janson, Michael Steiner, Michael Waidner: The State of the Art in Electronic Payment Systems; Computer 30/9 (1997) 28-35.
    • (1997) Computer , vol.30 , Issue.9 , pp. 28-35
    • Asokan, N.1    Janson, P.A.2    Steiner, M.3    Waidner, M.4
  • 2
    • 84957873374 scopus 로고    scopus 로고
    • The steganographic file system
    • Information Hiding, 2nd Workshop, Portland, Oregon, Springer, Heidelberg
    • Ross Andersen, Roger Needham, Adi Shamir: The Steganographic File System; Information Hiding, 2nd Workshop, Portland, Oregon, LNCS 1525, Springer, Heidelberg 1998, 73-82.
    • (1998) LNCS , vol.1525 , pp. 73-82
    • Andersen, R.1    Needham, R.2    Shamir, A.3
  • 4
    • 33746612195 scopus 로고    scopus 로고
    • Ein service zur haftungsverteilung für kompromittierte digitale signaturen
    • DuD Fachbeiträge, Vieweg, Braunschweig
    • Birgit Baum-Waidner: Ein Service zur Haftungsverteilung für kompromittierte digitale Signaturen; Verläßliche IT-Systeme, GI-Fachtagung VIS '99, DuD Fachbeiträge, Vieweg, Braunschweig 1999, 203-223.
    • (1999) Verläßliche IT-Systeme, GI-Fachtagung VIS '99 , pp. 203-223
    • Baum-Waidner, B.1
  • 5
    • 0025568003 scopus 로고
    • Value exchange systems enabling security and unobservability
    • Holger Bürk, Andreas Pfitzmann: Value Exchange Systems Enabling Security and Unobservability; Computers &: Security 9/8 (1990) 715-721.
    • (1990) Computers & Security , vol.9 , Issue.8 , pp. 715-721
    • Bürk, H.1    Pfitzmann, A.2
  • 6
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • David Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms; Communications of the ACM 24/2 (1981) 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 7
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • David Chaum: Security without Identification: Transaction Systems to make Big Brother Obsolete; Communications of the ACM 28/10 (1985) 1030-1044.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 8
    • 0005389958 scopus 로고
    • Privacy protected payments - Unconditional payer and/or payee untraceability
    • SMART CARD 2000: The Future of IC Cards, Laxenburg (Austria), 1987, North-Holland, Amsterdam
    • David Chaum: Privacy Protected Payments - Unconditional Payer and/or Payee Untraceability; SMART CARD 2000: The Future of IC Cards, Proc. of the IFIP WG 11.6 Intern. Conference; Laxenburg (Austria), 1987, North-Holland, Amsterdam 1989, 69-93.
    • (1989) Proc. of the IFIP WG 11.6 Intern. Conference , pp. 69-93
    • Chaum, D.1
  • 9
    • 85032463527 scopus 로고
    • Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms
    • Auscrypt '90, Springer, Berlin
    • David Chaum: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms; Auscrypt '90, LNCS 453, Springer, Berlin 1990, 246-264.
    • (1990) LNCS , vol.453 , pp. 246-264
    • Chaum, D.1
  • 11
    • 0029237418 scopus 로고
    • Preserving privacy in a network of mobile computers
    • IEEE Computer Society Press, Los Alamitos
    • David A. Cooper, Kenneth P. Birman: Preserving Privacy in a Network of Mobile Computers; 1995 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Los Alamitos 1995, 26-38.
    • (1995) 1995 IEEE Symposium on Research in Security and Privacy , pp. 26-38
    • Cooper, D.A.1    Birman, K.P.2
  • 13
    • 84941152835 scopus 로고    scopus 로고
    • Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria; December 1985, DOD 5200.28-STD, Supersedes CSC-STD-001-83, dtd 15 Aug 83, Library No. 8225,711
    • Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria; December 1985, DOD 5200.28-STD, Supersedes CSC-STD-001-83, dtd 15 Aug 83, Library No. 8225,711.
  • 14
    • 84955605258 scopus 로고    scopus 로고
    • Mixes in mobile communication systems: Location management with privacy
    • Information Hiding, 1st Workshop, Cambridge, UK, Springer, Heidelberg
    • Hannes Federrath, Anja Jerichow, Andreas Pfitzmann: Mixes in mobile communication systems: Location management with privacy; Information Hiding, 1st Workshop, Cambridge, UK, LNCS 1174, Springer, Heidelberg 1996, 321-135.
    • (1996) LNCS , vol.1174 , pp. 321-1135
    • Federrath, H.1    Jerichow, A.2    Pfitzmann, A.3
  • 15
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • David Goldschlag, Michael Reed, Paul Syverson: Onion Routing for Anonymous and Private Internet Connections; Communications of the ACM 42/2 (1999) 39-41.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 16
    • 84911338989 scopus 로고
    • ITSEC: Information technology security evaluation criteria
    • (28 June) Office for Official Publications of the European Communities, Luxembourg 1991 (ISBN 92-826-3004-8)
    • European Communities - Commission: ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg 1991 (ISBN 92-826-3004-8).
    • (1991) Provisional Harmonised Criteria, Version 1.2
  • 19
    • 33746598786 scopus 로고    scopus 로고
    • Biometrie - Wie einsetzen und wie nicht? Zum umgang mit sicherheitsproblemen von biometrie und sicherheits- und datenschutzproblemen durch biometrie
    • Dec.
    • Andreas Pfitzmann: Biometrie - wie einsetzen und wie nicht? Zum Umgang mit Sicherheitsproblemen von Biometrie und Sicherheits- und Datenschutzproblemen durch Biometrie; digma, Zeitschrift für Datenrecht und Informationssicherheit, Schulthess 5/4 (Dec. 2005) 154-157.
    • (2005) Digma, Zeitschrift für Datenrecht und Informationssicherheit, Schulthess , vol.5 , Issue.4 , pp. 154-157
    • Pfitzmann, A.1
  • 20
    • 0023331864 scopus 로고
    • Networks without user observability
    • Andreas Pfitzmann, Michael Waidrier: Networks without user observability; Computers & Security 6/2 (1987) 158-166.
    • (1987) Computers & Security , vol.6 , Issue.2 , pp. 158-166
    • Pfitzmann, A.1    Waidrier, M.2
  • 22
    • 84944184851 scopus 로고    scopus 로고
    • A Java-based distributed platform for multilateral security
    • IFIP/GI Working Conference "Trends in Electronic Commerce", Hamburg, Springer, Heidelberg
    • Andreas Pfitzmann, Alexander Schul, Andreas Westfeld, Guntram Wicke, Gritta Wolf, Jan Zöllner: A Java-based distributed platform for multilateral security; IFIP/GI Working Conference "Trends in Electronic Commerce", Hamburg, LNCS 1402, Springer, Heidelberg 1998, 52-64.
    • (1998) LNCS , vol.1402 , pp. 52-64
    • Pfitzmann, A.1    Schul, A.2    Westfeld, A.3    Wicke, G.4    Wolf, G.5    Zöllner, J.6
  • 23
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • Michael K. Reiter, Aviel D. Rubin: Anonymous Web Transactions with Crowds; Communications of the ACM 42/2 (1999) 32-38.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 32-38
    • Reiter, M.K.1    Rubin, A.D.2
  • 24
    • 0020762394 scopus 로고
    • Security mechanisms in high-level network protocols
    • Victor L. Voydock, Stephen T. Kent: Security Mechanisms in High-Level Network Protocols; ACM Computing Surveys 15/2 (1983) 135-171.
    • (1983) ACM Computing Surveys , vol.15 , Issue.2 , pp. 135-171
    • Voydock, V.L.1    Kent, S.T.2
  • 25
    • 0033717446 scopus 로고    scopus 로고
    • Properties of protection goals and their integration into a user interface
    • Gritta Wolf, Andreas Pfitzmann: Properties of protection goals and their integration into a user interface; Computer Networks 32 (2000) 685-699.
    • (2000) Computer Networks , vol.32 , pp. 685-699
    • Wolf, G.1    Pfitzmann, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.