-
1
-
-
0004226674
-
-
PhD thesis, University of Waterloo, Computer Science
-
Asokan, N. (1998). Fairness in electronic commerce. PhD thesis, University of Waterloo, Computer Science.
-
(1998)
Fairness in Electronic Commerce
-
-
Asokan, N.1
-
2
-
-
35248813721
-
-
Key words for use in RFCs to indicate requirement levels. IETF
-
Bradner, S. (1997). RFC 2119. Key words for use in RFCs to indicate requirement levels. IETF.
-
(1997)
RFC
, vol.2119
-
-
Bradner, S.1
-
6
-
-
35248870498
-
-
http://www.3gpp.org/ (n.d.).
-
-
-
-
7
-
-
35248862871
-
-
http://www.chiariglione.org/mpeg/ (n.d.).
-
-
-
-
8
-
-
35248845920
-
-
http://www.openmobilealliance.org (n.d.).
-
-
-
-
9
-
-
35248818649
-
-
http://www.wipo.int/treaties/en/ip/wct/index.html (n.d.).
-
-
-
-
12
-
-
0034920734
-
Multi-party fair exchange protocol using ring architecture model
-
5
-
Khill, I., Kim, J., Han, I., & Ryou, J. (2001). Multi-party fair exchange protocol using ring architecture model. Computers & Security, 20(5), 422-439.
-
(2001)
Computers & Security
, vol.20
, pp. 422-439
-
-
Khill, I.1
Kim, J.2
Han, I.3
Ryou, J.4
-
14
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
17
-
Kremer, S., Markowitch, O., & Zhou, J. (2002). An intensive survey of fair non-repudiation protocols. Computer Communications, 25(17), 1606-1621.
-
(2002)
Computer Communications
, vol.25
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
15
-
-
35248888379
-
-
kXML (n.d.). http://kxml.sourceforge.net/index.orig.shtml.
-
-
-
-
17
-
-
84944070321
-
Intermediary non-repudiation protocols
-
Onieva, J. A., Zhou, J., Carbonell, M., & Lopez, J. (2003). Intermediary non-repudiation protocols. In Proceedings of 2003 IEEE fifth conference on electronic commerce (pp. 207-214).
-
(2003)
Proceedings of 2003 IEEE Fifth Conference on Electronic Commerce
, pp. 207-214
-
-
Onieva, J.A.1
Zhou, J.2
Carbonell, M.3
Lopez, J.4
-
19
-
-
35248817684
-
-
Technical Report D2.1, UBISEC Consortium
-
Plaza, P., Gonzalez, J. L., Lacoste, M., Stern, D., Bormann, F., Zoth, C., Tacken, J., Lopez, J., Onieva, J., Soriano, M., Forne, J., Marin, A., Almenarez, F., Görlich, J., Eikerling, H.-J., Müller, W., & Schäfer, R. (2004). Mobile security: Requirements and state of the art analysis. Technical Report D2.1, UBISEC Consortium.
-
(2004)
Mobile Security: Requirements and State of the Art Analysis
-
-
Plaza, P.1
Gonzalez, J.L.2
Lacoste, M.3
Stern, D.4
Bormann, F.5
Zoth, C.6
Tacken, J.7
Lopez, J.8
Onieva, J.9
Soriano, M.10
Forne, J.11
Marin, A.12
Almenarez, F.13
Görlich, J.14
Eikerling, H.-J.15
Müller, W.16
Schäfer, R.17
-
23
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
R. Cramer (Ed.) EUROCRYPT, Springer
-
Wang, X., Lai, X., Feng, D., Chen, H., & Yu, X. (2005). Cryptanalysis of the hash functions MD4 and RIPEMD. In R. Cramer (Ed.), Lecture notes in computer science: Vol. 3494. Advances in cryptology (pp. 1-18). EUROCRYPT, Springer.
-
(2005)
Lecture Notes in Computer Science: Vol. 3494. Advances in Cryptology
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
25
-
-
35248896640
-
Mobile digital rights management
-
Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory Helsinki
-
Yan, Z. (2001). Mobile digital rights management. In L. Staffans & T. Virtanen (Eds.), T-110.501 seminar on network security. Helsinki: Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory.
-
(2001)
T-110.501 Seminar on Network Security
-
-
Yan, Z.1
Staffans, L.2
Virtanen, T.3
|