-
1
-
-
0024914229
-
Security-control methods for statistical databases
-
Dec. 1989
-
Adam, 1989. Security-control methods for statistical databases. ACMComputing Surveys, 21(4):515- 556, Dec. 1989.
-
(1989)
ACMComputing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam1
-
6
-
-
0004238984
-
-
Addison-Wesley Publishing Company, Inc. 1982
-
Denning, 1997. Cryptography and Data Security. Addison-Wesley Publishing Company, Inc., 1982.
-
(1997)
Cryptography and Data Security
-
-
Denning1
-
9
-
-
33749055569
-
-
O'Reilly & Associates, Inc. 1997
-
Garnkel, 1997. Web Security & Commerce. O'Reilly & Associates, Inc., 1997.
-
(1997)
Web Security & Commerce
-
-
Garnkel1
-
10
-
-
0003781860
-
-
Macmillan Technical Publishing, 1998
-
Guthery, 1998. Smart Card Developer's Kit. Macmillan Technical Publishing, 1998.
-
(1998)
Smart Card Developer's Kit
-
-
Guthery1
-
12
-
-
78649313704
-
-
Osborne/McGraw- Hill, 1997
-
Koch, 1997. The Complete Reference. Osborne/McGraw- Hill, 1997.
-
(1997)
The Complete Reference
-
-
Koch1
-
13
-
-
0001632721
-
Pseudo-random number generators in cryptography and number theory
-
American Mathematical Society, 1990.
-
Lagarias, 1990. Pseudo-random number generators in cryptography and number theory. InCryptology and Computational Number Theory, pages 115-143.American Mathematical Society, 1990.
-
(1990)
InCryptology and Computational Number Theory
, pp. 115-143
-
-
Lagarias1
-
14
-
-
78649262889
-
Improving DES hardware throughput for short operations
-
2001
-
Lindemann, 2001. Improving DES Hardware Throughput for Short Operations, IBM Research Report, 2001.
-
(2001)
IBM Research Report
-
-
Lindemann1
-
15
-
-
0027609384
-
A survey of intrusion detection techniques
-
1993
-
Lunt, 1993. A survey of intrusion detection techniques. Computer & Security, 12(4), 1993.
-
(1993)
Computer & Security
, vol.12
, Issue.4
-
-
Lunt1
-
16
-
-
0003629990
-
-
NIST, National Bureau of Standards FIPS Publication 180. Secure Hash Standard, 1993
-
NIST, 1993. National Bureau of Standards FIPS Publication 180. Secure Hash Standard, 1993.
-
(1993)
Secure Hash Standard
-
-
-
17
-
-
0003508568
-
-
NIST, 1977. National Bureau of Standards FIPS Publication 46
-
NIST, 1977. National Bureau of Standards FIPS Publication 46. Data Encryption Standard (DES), 1977.
-
(1977)
Data Encryption Standard (DES)
-
-
-
18
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
1994
-
Neuman, 1994. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman1
-
19
-
-
58149332399
-
-
Web site hacked; cards being canceled, Jan. 20, 2000
-
San Jose Mercury News, 2000. Web site hacked; cards being canceled, Jan. 20, 2000.
-
(2000)
San Jose Mercury News
-
-
-
20
-
-
78649271773
-
-
Oracle, Technical White Paper., November 1999
-
Oracle, 1999. Technical White Paper. Database Security in Oracle8i, November 1999.
-
(1999)
Database Security in Oracle8i
-
-
-
21
-
-
0004093038
-
-
John Wiley & Sons Ltd, 1997
-
Rankl, 1997.Smart Card Handbook. John Wiley & Sons Ltd, 1997.
-
(1997)
Smart Card Handbook
-
-
Rankl1
-
22
-
-
0003195066
-
The MD5 message-digest algorithm
-
April,1992
-
Rivest, 1992. The MD5 Message-Digest Algorithm, RFC1321 (I). April 1992.
-
(1992)
RFC1321
, Issue.1
-
-
Rivest1
-
23
-
-
0017930809
-
A method for obtaining digital signature and public key cryptosystems
-
February 1978
-
Rivest, 1978. A method for obtaining digital signature and public key cryptosystems. Communications of the ACM, 21:120-126, February 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest1
-
24
-
-
0004099837
-
-
O'Reilly & Associates, Inc. 1992
-
Rosenberry, 1992. Understanding DCE. O'Reilly & Associates, Inc., 1992.
-
(1992)
Understanding DCE
-
-
Rosenberry1
-
25
-
-
0018545449
-
How to share a secret
-
1979
-
Shamir, 1979. How to share a secret. Communication of the ACM, 22(11):612-613, 1979.
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir1
|