-
1
-
-
0038223020
-
-
Technical Report, Computer Science and Engineering Department, University of California at San Diego, Nov.
-
M. Bellare and B. Yee, Forward Integrity for Secure Audit Logs, Technical Report, Computer Science and Engineering Department, University of California at San Diego, Nov. 1997.
-
(1997)
Forward Integrity for Secure Audit Logs
-
-
Bellare, M.1
Yee, B.2
-
2
-
-
0013017020
-
Rijndael, the advanced encryption standard
-
Mar
-
J. Daemen and V. Rijmen, " Rijndael, the advanced encryption standard," Dr. Dobb's Journal, vol. 26, no. 3, pp. 137-139, Mar. 2001.
-
(2001)
Dr. Dobb's Journal
, vol.26
, Issue.3
, pp. 137-139
-
-
Daemen, J.1
Rijmen, V.2
-
4
-
-
2442505609
-
SPECSA: a scalable, policydriven, extensible, and customizable security architecture for wireless enterprise applications
-
W. Itani and A. Kayssi, " SPECSA: a scalable, policydriven, extensible, and customizable security architecture for wireless enterprise applications," in Proceedings of the IEEE IPCCC Workshop on Information Assurance (WIA04), pp. 753-759, Phoenix, Arizona, Apr. 2004.
-
(2004)
Processingceedings of the IEEE IPCCC Workshop on Information Assurance (WIA04), Phoenix, Arizona, Apr
, pp. 753-759
-
-
Itani, W.1
Kayssi, A.2
-
6
-
-
84874876015
-
-
Microsoft's .Net Compact Framework Home Page
-
Microsoft's .Net Compact Framework Home Page, http://msdn.microsoft.com/smartclient/netcf/default.aspx.
-
-
-
-
7
-
-
84874835098
-
-
Microsoft's Visual Studio 2005 Home Page
-
Microsoft's Visual Studio 2005 Home Page, http://msdn.microsoft.com/vs2005/default.aspx.
-
-
-
-
8
-
-
84874902663
-
-
National Institute of Standards and Technology, Secure Hash Standard, Federal Information Processing Standards, Publication
-
National Institute of Standards and Technology, Secure Hash Standard, Federal Information Processing Standards, Publication 180-1, 1995.
-
(1995)
, pp. 180-181
-
-
-
10
-
-
0031177289
-
Remote auditing of software outputs Using a Trusted Coprocessor
-
B. Schneier and J. Kelsey, " Remote auditing of software outputs Using a Trusted Coprocessor," Future Generation Computer Systems13, vol. 1, pp. 9-18, 1997.
-
(1997)
Future Generation Computer Systems13
, vol.1
, pp. 9-18
-
-
Schneier, B.1
Kelsey, J.2
-
11
-
-
85021950441
-
Secure audit logs to support computer forensics
-
May
-
B. Schneier and J. Kelsey, " Secure audit logs to support computer forensics" , ACM Transactions on Information and System Security, vol. 2, no. 2, pp. 159-196, May 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
, pp. 159-196
-
-
Schneier, B.1
Kelsey, J.2
-
12
-
-
85054455230
-
Tamper detection in audit logs
-
Toronto, Canada
-
R. Snodgrass, S. Yao, and C. Collberg, " Tamper detection in audit logs" , in Proceedings of the 30th VLDB Conference, Toronto, pp. 504-515, Canada, 2004.
-
(2004)
Proceedings of the 30th VLDB Conference
, pp. 504-515
-
-
Snodgrass, R.1
Yao, S.2
Collberg, C.3
-
13
-
-
84985796228
-
HAVAL-A one-way hashing algorithm with variable length of output
-
Y. Zheng, J. Pieprzyk, and J. Seberry, " HAVAL-A one-way hashing algorithm with variable length of output," in Auscrypto '92, LNCS 718, pp. 83-104, 1992.
-
(1992)
Auscrypto '92, LNCS
, vol.718
, pp. 83-104
-
-
Zheng, Y.1
Pieprzyk, J.2
Seberry, J.3
|