-
1
-
-
34248343312
-
-
Barlow L. A discussion of cryptographic protocols for electronic voting; 2003.
-
-
-
-
2
-
-
34248386031
-
-
ETSI TS 102 042. Policy requirements for certification authorities issuing public key certificates; 2002.
-
-
-
-
3
-
-
34248358540
-
-
FIBS PUB 140-2. Security requirements for cryptographic modules.
-
-
-
-
4
-
-
30944451994
-
Security for application service providers
-
[Elsevier]
-
Groves J. Security for application service providers. Network Security 2001 1 (January 1, 2001) 6-9 [Elsevier]
-
(2001)
Network Security
, vol.2001
, Issue.1
, pp. 6-9
-
-
Groves, J.1
-
5
-
-
10644250089
-
Security considerations in ad hoc sensor networks
-
[Elsevier]
-
Hu F., and Sharma K.N. Security considerations in ad hoc sensor networks. Ad Hoc Networks 3 (2005) 69-89 [Elsevier]
-
(2005)
Ad Hoc Networks
, vol.3
, pp. 69-89
-
-
Hu, F.1
Sharma, K.N.2
-
6
-
-
34248392114
-
-
ISO/IEC 11770-3. Key management - Part 3: mechanisms using asymmetric techniques 1999-11-01.
-
-
-
-
7
-
-
34248338228
-
-
ISO/IEC 13335-2. Information technology - security techniques - management of information and communications technology (ICT) security - Part 2: Techniques for information and communications technology security risk management; 2003.
-
-
-
-
8
-
-
34248389619
-
-
ISO/IEC 15408. Information technology - security techniques - evaluation criteria for IT security.
-
-
-
-
9
-
-
34248399079
-
-
ISO/IEC 19790. Security techniques - security requirements for cryptographic modules.
-
-
-
-
10
-
-
34248324303
-
Cryptographic protocol for electronic auctions with extended requirements
-
Ksie{ogonek}żopolski B., and Kotulski Z. Cryptographic protocol for electronic auctions with extended requirements. Annales UMCS Informatica 2 (2004) 391-400
-
(2004)
Annales UMCS Informatica
, vol.2
, pp. 391-400
-
-
Ksiezopolski, B.1
Kotulski, Z.2
-
11
-
-
34147170343
-
On automatic secret generation and sharing for Karin-Greene-Hellman scheme
-
Sołdek J., and Drobiazgiewicz L. (Eds), Kluwer
-
Kulesza K., and Kotulski Z. On automatic secret generation and sharing for Karin-Greene-Hellman scheme. In: Sołdek J., and Drobiazgiewicz L. (Eds). Artificial intelligence and security in computing systems (2003), Kluwer 281-292
-
(2003)
Artificial intelligence and security in computing systems
, pp. 281-292
-
-
Kulesza, K.1
Kotulski, Z.2
-
12
-
-
0042879531
-
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
-
[Elsevier]
-
Lambrinoudakis C., Gritzalis S., Dridi F., and Pernul G. Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy. Computer Communication 26 (2003) 1873-1883 [Elsevier]
-
(2003)
Computer Communication
, vol.26
, pp. 1873-1883
-
-
Lambrinoudakis, C.1
Gritzalis, S.2
Dridi, F.3
Pernul, G.4
-
13
-
-
34248400288
-
Advanced security techniques for network protection
-
[Elsevier]
-
Merabti M., Shi Q., and Oppliger R. Advanced security techniques for network protection. Computer Communications 23 (2000) 1581-1583 [Elsevier]
-
(2000)
Computer Communications
, vol.23
, pp. 1581-1583
-
-
Merabti, M.1
Shi, Q.2
Oppliger, R.3
-
14
-
-
1242308778
-
An empirical investigation of network attacks on computer system
-
[Elsevier]
-
Moitr S., and Konda S. An empirical investigation of network attacks on computer system. Computer and Security 23 (2004) 43-51 [Elsevier]
-
(2004)
Computer and Security
, vol.23
, pp. 43-51
-
-
Moitr, S.1
Konda, S.2
-
15
-
-
34248359378
-
-
NIST. Volume I: guide for mapping types of information and information systems to security categories; March 2004.
-
-
-
-
16
-
-
34248330691
-
KEYSTONE project, Support for legal framework and anonymity in the KEYSTONE public key infrastructure architecture
-
Kluwer Academic Publisher, Stockholm, Sweden p. 243-54
-
Patel A., Gladychev P., Katsikas S., Gritzalis S., and Lekkas D. KEYSTONE project, Support for legal framework and anonymity in the KEYSTONE public key infrastructure architecture. In: Proceedings of UIPP'99 IFIP international joint working conference on user identification and privacy protection (June 1999), Kluwer Academic Publisher, Stockholm, Sweden p. 243-54
-
(1999)
In: Proceedings of UIPP'99 IFIP international joint working conference on user identification and privacy protection
-
-
Patel, A.1
Gladychev, P.2
Katsikas, S.3
Gritzalis, S.4
Lekkas, D.5
-
17
-
-
85131783489
-
Technologies for trust in electronic commerce
-
[Kluwer Academic Publishers]
-
Patton M.A., and Josang A. Technologies for trust in electronic commerce. Electronic Commerce Research 4 (2004) 9-21 [Kluwer Academic Publishers]
-
(2004)
Electronic Commerce Research
, vol.4
, pp. 9-21
-
-
Patton, M.A.1
Josang, A.2
-
19
-
-
18144441936
-
Generation of key pre-distribution schemes using secret sharing schemes
-
[Elsevier]
-
Saez G. Generation of key pre-distribution schemes using secret sharing schemes. Discrete Applied Mathematics 128 (2003) 239-249 [Elsevier]
-
(2003)
Discrete Applied Mathematics
, vol.128
, pp. 239-249
-
-
Saez, G.1
-
20
-
-
8344273612
-
Personalised cryptographic key generation based on Face Hashing
-
[Elsevier]
-
Teoh A., Ngo D., and Goh A. Personalised cryptographic key generation based on Face Hashing. Computer and Security 23 (2004) 606-614 [Elsevier]
-
(2004)
Computer and Security
, vol.23
, pp. 606-614
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
-
21
-
-
1542335490
-
Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks
-
[Elsevier]
-
Tzong-Sun W., and Chien-Lung H. Efficient user identification scheme with key distribution preserving anonymity for distributed computer networks. Computer and Security 23 (2004) 120-125 [Elsevier]
-
(2004)
Computer and Security
, vol.23
, pp. 120-125
-
-
Tzong-Sun, W.1
Chien-Lung, H.2
|