-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, pp. 120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
2
-
-
84861909958
-
-
TCG Best Practices Committee, Online, Available
-
TCG Best Practices Committee, "Design, implementation, and usage principles for TPM-based platforms," 2005. [Online]. Available: https://www.trustedcomputinggroup.org/downloads/bestpractices-/ Best_Practices_Principles_Document_v1.0.pdf
-
(2005)
Design, implementation, and usage principles for TPM-based platforms
-
-
-
3
-
-
34250719016
-
-
F. Chiachiarella, U. Fasting, T. Fey, S. Leppler, G. Lux, P. Lubb, A. Moser, G. Otten, J. Schlattmann, S. Schumann, L. Schweizer, and F.-J. Souren, Das Risiko Trusted Computing für die deutsche Versicherungswirtschaft, Schriftenreihe des Betriebswirtschaftlichen Institutes des GDV, 13, 2004. [Online]. Available: http://www.gdv- online.de/tcg/pos_tcg.pdf
-
F. Chiachiarella, U. Fasting, T. Fey, S. Leppler, G. Lux, P. Lubb, A. Moser, G. Otten, J. Schlattmann, S. Schumann, L. Schweizer, and F.-J. Souren, "Das Risiko Trusted Computing für die deutsche Versicherungswirtschaft," Schriftenreihe des Betriebswirtschaftlichen Institutes des GDV, vol. 13, 2004. [Online]. Available: http://www.gdv- online.de/tcg/pos_tcg.pdf
-
-
-
-
5
-
-
84926193517
-
Visual cryptography
-
Online, Available
-
M. Naor and A. Shamir, "Visual cryptography," Lecture Notes in Computer Science, vol. 950, pp. 1-12, 1995. [Online]. Available: citeseer.ist.psu.edu/naor95visual.html
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
6
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
33746596537
-
Visual document authentication using human-recognizable watermarks
-
Proceedings of ETRICS 2006, Springer-Verlag, June
-
I. Fischer and T. Herfet, "Visual document authentication using human-recognizable watermarks," in Proceedings of ETRICS 2006, LNCS 3995. Springer-Verlag, June 2006, pp. 509-521.
-
(2006)
LNCS
, vol.3995
, pp. 509-521
-
-
Fischer, I.1
Herfet, T.2
-
9
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
Online, Available
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security," in Proceedings of Eurocrypt, 2003, pp. 294-311. [Online]. Available: citeseer.ist.psu.edu/vonahn03captcha.html
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
10
-
-
0041431049
-
Recognizing objects in adversarial clutter - breaking a visual captcha
-
Madison, USA: IEEE Computer Society, June, Online, Available
-
G. Mori and J. Malik, "Recognizing objects in adversarial clutter - breaking a visual captcha," in Proc. Conf. Computer Vision and Pattern Recognition, vol. 1. Madison, USA: IEEE Computer Society, June 2003, pp. 134-141. [Online]. Available: citeseer.ist.psu.edu/mori03recognizing.html
-
(2003)
Proc. Conf. Computer Vision and Pattern Recognition
, vol.1
, pp. 134-141
-
-
Mori, G.1
Malik, J.2
|