메뉴 건너뛰기




Volumn 26, Issue 3, 2007, Pages 246-255

Adaptable security mechanism for dynamic environments

Author keywords

Cryptographic protocol; Cryptography; Information security; Network security; Risk management; Scalable security

Indexed keywords

DATA COMMUNICATION SYSTEMS; ELECTRONIC COMMERCE; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; PUBLIC KEY CRYPTOGRAPHY; RISK MANAGEMENT;

EID: 34248325314     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.11.002     Document Type: Article
Times cited : (38)

References (21)
  • 1
    • 34248343312 scopus 로고    scopus 로고
    • Barlow L. A discussion of cryptographic protocols for electronic voting; 2003.
  • 2
    • 34248386031 scopus 로고    scopus 로고
    • ETSI TS 102 042. Policy requirements for certification authorities issuing public key certificates; 2002.
  • 3
    • 34248358540 scopus 로고    scopus 로고
    • FIBS PUB 140-2. Security requirements for cryptographic modules.
  • 4
    • 30944451994 scopus 로고    scopus 로고
    • Security for application service providers
    • [Elsevier]
    • Groves J. Security for application service providers. Network Security 2001 1 (January 1, 2001) 6-9 [Elsevier]
    • (2001) Network Security , vol.2001 , Issue.1 , pp. 6-9
    • Groves, J.1
  • 5
    • 10644250089 scopus 로고    scopus 로고
    • Security considerations in ad hoc sensor networks
    • [Elsevier]
    • Hu F., and Sharma K.N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 3 (2005) 69-89 [Elsevier]
    • (2005) Ad Hoc Networks , vol.3 , pp. 69-89
    • Hu, F.1    Sharma, K.N.2
  • 6
    • 34248392114 scopus 로고    scopus 로고
    • ISO/IEC 11770-3. Key management - Part 3: mechanisms using asymmetric techniques 1999-11-01.
  • 7
    • 34248338228 scopus 로고    scopus 로고
    • ISO/IEC 13335-2. Information technology - security techniques - management of information and communications technology (ICT) security - Part 2: Techniques for information and communications technology security risk management; 2003.
  • 8
    • 34248389619 scopus 로고    scopus 로고
    • ISO/IEC 15408. Information technology - security techniques - evaluation criteria for IT security.
  • 9
    • 34248399079 scopus 로고    scopus 로고
    • ISO/IEC 19790. Security techniques - security requirements for cryptographic modules.
  • 10
    • 34248324303 scopus 로고    scopus 로고
    • Cryptographic protocol for electronic auctions with extended requirements
    • Ksie{ogonek}żopolski B., and Kotulski Z. Cryptographic protocol for electronic auctions with extended requirements. Annales UMCS Informatica 2 (2004) 391-400
    • (2004) Annales UMCS Informatica , vol.2 , pp. 391-400
    • Ksiezopolski, B.1    Kotulski, Z.2
  • 11
    • 34147170343 scopus 로고    scopus 로고
    • On automatic secret generation and sharing for Karin-Greene-Hellman scheme
    • Sołdek J., and Drobiazgiewicz L. (Eds), Kluwer
    • Kulesza K., and Kotulski Z. On automatic secret generation and sharing for Karin-Greene-Hellman scheme. In: Sołdek J., and Drobiazgiewicz L. (Eds). Artificial intelligence and security in computing systems (2003), Kluwer 281-292
    • (2003) Artificial intelligence and security in computing systems , pp. 281-292
    • Kulesza, K.1    Kotulski, Z.2
  • 12
    • 0042879531 scopus 로고    scopus 로고
    • Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
    • [Elsevier]
    • Lambrinoudakis C., Gritzalis S., Dridi F., and Pernul G. Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communication 26 (2003) 1873-1883 [Elsevier]
    • (2003) Computer Communication , vol.26 , pp. 1873-1883
    • Lambrinoudakis, C.1    Gritzalis, S.2    Dridi, F.3    Pernul, G.4
  • 13
    • 34248400288 scopus 로고    scopus 로고
    • Advanced security techniques for network protection
    • [Elsevier]
    • Merabti M., Shi Q., and Oppliger R. Advanced security techniques for network protection. Computer Communications 23 (2000) 1581-1583 [Elsevier]
    • (2000) Computer Communications , vol.23 , pp. 1581-1583
    • Merabti, M.1    Shi, Q.2    Oppliger, R.3
  • 14
    • 1242308778 scopus 로고    scopus 로고
    • An empirical investigation of network attacks on computer system
    • [Elsevier]
    • Moitr S., and Konda S. An empirical investigation of network attacks on computer system. Computer and Security 23 (2004) 43-51 [Elsevier]
    • (2004) Computer and Security , vol.23 , pp. 43-51
    • Moitr, S.1    Konda, S.2
  • 15
    • 34248359378 scopus 로고    scopus 로고
    • NIST. Volume I: guide for mapping types of information and information systems to security categories; March 2004.
  • 17
    • 85131783489 scopus 로고    scopus 로고
    • Technologies for trust in electronic commerce
    • [Kluwer Academic Publishers]
    • Patton M.A., and Josang A. Technologies for trust in electronic commerce. Electronic Commerce Research 4 (2004) 9-21 [Kluwer Academic Publishers]
    • (2004) Electronic Commerce Research , vol.4 , pp. 9-21
    • Patton, M.A.1    Josang, A.2
  • 19
    • 18144441936 scopus 로고    scopus 로고
    • Generation of key pre-distribution schemes using secret sharing schemes
    • [Elsevier]
    • Saez G. Generation of key pre-distribution schemes using secret sharing schemes. Discrete Applied Mathematics 128 (2003) 239-249 [Elsevier]
    • (2003) Discrete Applied Mathematics , vol.128 , pp. 239-249
    • Saez, G.1
  • 20
    • 8344273612 scopus 로고    scopus 로고
    • Personalised cryptographic key generation based on Face Hashing
    • [Elsevier]
    • Teoh A., Ngo D., and Goh A. Personalised cryptographic key generation based on Face Hashing. Computer and Security 23 (2004) 606-614 [Elsevier]
    • (2004) Computer and Security , vol.23 , pp. 606-614
    • Teoh, A.1    Ngo, D.2    Goh, A.3
  • 21
    • 1542335490 scopus 로고    scopus 로고
    • Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
    • [Elsevier]
    • Tzong-Sun W., and Chien-Lung H. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computer and Security 23 (2004) 120-125 [Elsevier]
    • (2004) Computer and Security , vol.23 , pp. 120-125
    • Tzong-Sun, W.1    Chien-Lung, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.