-
1
-
-
84874739779
-
-
Chaum D, Rivest RL, Sherman AT, editors
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a multilevel security problem," Chaum D, Rivest RL, Sherman AT, editors, in em Advances in Cryp-tology, 1982.
-
(1982)
Cryptographic solution to a multilevel security problem, in em Advances in Cryp-tology
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
July
-
S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy", ACM Transaction on Computer Systems, vol. 1, no. 3, pp. 239-248, July 1983.
-
(1983)
ACM Transaction on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
0005314588
-
-
Technical Report 95-09, Department of Computer Science, University of Wollongong, July
-
S. Bakhtiari, R. Safavi-Naini, J. Pieprzyk, Crypto-graphic Hash Functions: A Survey, Technical Report 95-09, Department of Computer Science, University of Wollongong, July 1995.
-
(1995)
Crypto-graphic Hash Functions: A Survey
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
4
-
-
0005314588
-
-
Technical Report 95-09, Department of Computer Science, University of Wollongong, July
-
S. Bakhtiari, R.Safavi-Naini, J. Pieprzyk, Crypto-graphic Hash Functions: A Survey, Technical Report 95-09, Department of Computer Science, University of Wollongong, July 1995.
-
(1995)
Crypto-graphic Hash Functions: A Survey
-
-
Bakhtiari, S.1
Safavi-Naini, R.2
Pieprzyk, J.3
-
5
-
-
84958957924
-
RIPEMD-160, a strengthened version of RIPEMD
-
Springer-Verlag
-
H. Dobbertin, A. Bosselaers, and B. Preenel, "RIPEMD-160, a strengthened version of RIPEMD", em Fast Software Encryption, LNCS 1039, Springer-Verlag, 71-82, 1996.
-
(1996)
em Fast Software Encryption LNCS 1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preenel, B.3
-
7
-
-
0343701069
-
-
Internet-Draft, draft-ietf-ipsec-intragjm-00.txt, Nov. 1998
-
T. Hardjono, B. Cain B, I. Monga, Intra-domain Group Key Management Protocol, Internet-Draft, draft-ietf-ipsec-intragjm-00.txt, Nov. 1998.
-
Intra-domain Group Key Management Protocol
-
-
Hardjono, T.1
Cain, B.2
Monga, B.I.3
-
9
-
-
84874685021
-
-
Xilinx, California, USA
-
S. Jose, Virtex, 2.5 V Field Programmable Gate Ar-rays, Xilinx, California, USA, www.xilinx.com, 2005.
-
(2005)
Virtex, 2.5 V Field Programmable Gate Ar-rays
-
-
Jose, S.1
-
11
-
-
84874693444
-
-
SHA-1 Standard, National Institute of Standards and Technology (NIST)FIPS PUB 180-1
-
SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1, www.itl.nist.gov/fipspubs/fip180-1.htm, 2005.
-
(2005)
Secure Hash Standard
-
-
-
12
-
-
84874693444
-
-
SHA-2 Standard, National Institute of Standards and Technology (NIST) FIPS PUB 180-2
-
SHA-2 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-2, www.itl.nist.gov/fipspubs/fip180-2.htm, 2005.
-
(2005)
Secure Hash Standard
-
-
-
13
-
-
0003851399
-
-
Second Edition, John Wiley and Sons, New York
-
B. Schneier, Applied Cryptography-Protocols, Algo-rithms and Source Code in C, Second Edition, John Wiley and Sons, New York, 1996.
-
(1996)
Applied Cryptography-Protocols, Algo-rithms and Source Code in C
-
-
Schneier, B.1
-
14
-
-
0036287554
-
Random number generator architec-ture and VLSI implementation in
-
USA
-
N. Sklavos, P. Kitsos, K. Papadomanolakis and O. Koufopavlou, "Random number generator architec-ture and VLSI implementation" in proceedings of IEEE International Symposium on Circuits & Sys-tems (ISCAS'02), pp. 854-857, USA, 2002.
-
(2002)
proceedings of IEEE International Symposium on Circuits & Sys-tems (ISCAS'02)
, pp. 854-857
-
-
Sklavos, N.1
Kitsos, P.2
Papadomanolakis, K.3
Koufopavlou, O.4
-
15
-
-
8744252011
-
Mobile communi-cations world: security implementations aspects - A state of the art"
-
32
-
N. Sklavos and O. Koufopavlou, "Mobile communi-cations world: security implementations aspects - A state of the art CSJM Journal: Institute of Math-ematics and Computer Science, vol. 11, no. 2 (32), pp. 168-187, 2003.
-
(2003)
CSJM Journal: Institute of Math-ematics and Computer Science
, vol.11
, Issue.2
, pp. 168-187
-
-
Sklavos, N.1
Koufopavlou, O.2
-
17
-
-
0002360030
-
Secure group communications using key graphs
-
C. K. Wong, M. Gouda, S. S. Lam, "Secure group communications using key graphs," in proceedings of ACM SIGCOMM'98, pp. 69-72, 1998.
-
(1998)
proceedings of ACM SIGCOMM'98
, pp. 69-72
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
18
-
-
0029292250
-
Dynamic access control scheme based on the Chinese remainder the-orem
-
T. C. Wu, T. S. Wu, W. H. He, "Dynamic access control scheme based on the Chinese remainder the-orem," Computer Systems: Science and Engineering, vol. 2, pp. 92-99, 1995.
-
(1995)
Computer Systems: Science and Engineering
, vol.2
, pp. 92-99
-
-
Wu, T.C.1
Wu, T.S.2
He, W.H.3
-
19
-
-
10644259523
-
Access control in a hierarchy us-ing one-way hash functions
-
C. Yang and C. Li, "Access control in a hierarchy us-ing one-way hash functions," Computers & Security, vol. 23, no. 8, pp. 659-664, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 659-664
-
-
Yang, C.1
Li, C.2
|