-
1
-
-
1642394689
-
-
C. Kaler, editor, Version 1.0. Apr. 05 Last accessed: February 24, 2003
-
B. Atkinson, G. Della-Libera, S. Hada, M. Hondo, P. Hallam-Baker, J. Klein, B. LaMacchia, P. Leach, J. Manferdelli, H. Maruyama, A. Nadalin, N. Nagaratnam, H. Prafullchandra, J. Shewchuk, and D. Simon. Web services security (WS-Security). In C. Kaler, editor, Version 1.0. Apr. 05 2002. [Last accessed: February 24, 2003] http://www-106.ibm.com/developerworks/library/ws-secure/.
-
(2002)
Web services security (WS-Security)
-
-
Atkinson, B.1
Della-Libera, G.2
Hada, S.3
Hondo, M.4
Hallam-Baker, P.5
Klein, J.6
LaMacchia, B.7
Leach, P.8
Manferdelli, J.9
Maruyama, H.10
Nadalin, A.11
Nagaratnam, N.12
Prafullchandra, H.13
Shewchuk, J.14
Simon, D.15
-
2
-
-
0141751864
-
XML-signature syntax and processing
-
D. Eastlake, J. Reagle, and D. Solo, editors, Feb. 12 Last accessed: September 18, 2002
-
M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-signature syntax and processing. In D. Eastlake, J. Reagle, and D. Solo, editors, W3C Recommendation. Feb. 12 2002. [Last accessed: September 18, 2002] http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/.
-
(2002)
W3C Recommendation
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
LaMacchia, B.4
Simon, E.5
-
3
-
-
84958775356
-
Transitive signatures based on factoring and RSA
-
Y. Zheng, editor, Proceedings of The 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002), Springer, December
-
M. Bellare and G. Neven. Transitive signatures based on factoring and RSA. In Y. Zheng, editor, Proceedings of The 8th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2002), volume 2501 of Lecture Notes in Computer Science, pages 397-414. Springer, December 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2501
, pp. 397-414
-
-
Bellare, M.1
Neven, G.2
-
5
-
-
0003357375
-
Simple Object Access Protocol (SOAP) 1.1
-
8 May, 2002 edition, Last accessed: November 15, 2002
-
D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1. W3C note 8 May, 2002 edition, 2002. [Last accessed: November 15, 2002] http://www.w3.org/ TR/2000/NOTE-SOAP-20000508.
-
(2002)
W3C Note
-
-
Box, D.1
Ehnebuske, D.2
Kakivaya, G.3
Layman, A.4
Mendelsohn, N.5
Nielsen, H.6
Thatte, S.7
Winer, D.8
-
6
-
-
33744478570
-
Exclusive XML Canonicalization
-
18 July, 2002 edition, Last accessed: July 12, 2002
-
J. Boyer, D. Eastlake, and J. Reagle. Exclusive XML Canonicalization. W3C Recommendation 18 July, 2002 edition, 2002. [Last accessed: July 12, 2002] http://www.w3.org/TR/2002/REC-xml-exc-c14n-20020718/.
-
(2002)
W3C Recommendation
-
-
Boyer, J.1
Eastlake, D.2
Reagle, J.3
-
7
-
-
84880460170
-
XML-Signature XPath Filter 2.0
-
08 November, 2002 edition, Last accessed: November 12, 2002
-
J. Boyer, M. Hughes, and J. Reagle. XML-Signature XPath Filter 2.0. W3C Recommendation 08 November, 2002 edition, 2002. [Last accessed: November 12, 2002] http://www.w3.org/TR/2002/REC-xmldsig-filter2-20021108/.
-
(2002)
W3C Recommendation
-
-
Boyer, J.1
Hughes, M.2
Reagle, J.3
-
9
-
-
33749665781
-
-
Available online, Feb. 20 Last accessed: February 18, 2003
-
S. Brands. A technical overview of digital credentials. Available online, Feb. 20 2002. [Last accessed: February 18, 2003] http://www.xs4all.nl/ ∼brands/overview.pdf.
-
(2002)
A Technical Overview of Digital Credentials
-
-
Brands, S.1
-
10
-
-
84880502325
-
-
Technical Report 2002/123, School of Computer Science and Software Engineering, Monash University, 900 Dandenong Road, Caulfield East, Victoria 3145 Australia, October
-
L. Bull, J. Newmarch, and Y. Zheng. Enhancing privacy through selective disclosure of verifiable content or the facts, the whole facts, and nothing but the facts. Technical Report 2002/123, School of Computer Science and Software Engineering, Monash University, 900 Dandenong Road, Caulfield East, Victoria 3145 Australia, October 2002.
-
(2002)
Enhancing Privacy Through Selective Disclosure of Verifiable Content or the Facts, the Whole Facts, and Nothing but the Facts
-
-
Bull, L.1
Newmarch, J.2
Zheng, Y.3
-
11
-
-
0035748036
-
Flexible authentication of XML documents
-
P. T. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. G. Stubblebine. Flexible authentication of XML documents. In ACM Conference on Computer and Communications Security, pages 136-45, 2001.
-
(2001)
ACM Conference on Computer and Communications Security
, pp. 136-145
-
-
Devanbu, P.T.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.G.6
-
13
-
-
2442621633
-
-
version 3.0. Available online, Last accessed: September 18, 2002
-
A. Freier, P. Karlton, and P. Kocher. The SSL protocol version 3.0. Available online, 1996. [Last accessed: September 18, 2002] http://wp.netscape. com/eng/ssl3/draft302.txt.
-
(1996)
The SSL Protocol
-
-
Freier, A.1
Karlton, P.2
Kocher, P.3
-
14
-
-
84944905011
-
Homomorphic signature schemes
-
Proceedings of the RSA Security Conference Cryptographers Track, Springer, February
-
R. Johnson, D. Molnar, D. Song, and D. Wagner. Homomorphic signature schemes. In Proceedings of the RSA Security Conference Cryptographers Track, volume 2271 of Lecture Notes in Computer Science, pages 244-62. Springer, February 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 244-262
-
-
Johnson, R.1
Molnar, D.2
Song, D.3
Wagner, D.4
-
15
-
-
0345241830
-
-
Addison-Wesley, Boston, MA
-
B. LaMacchia, S. Lange, M. Lyons, R. Martin, and K. Price. .NET Framework Security. Addison-Wesley, Boston, MA, 2002.
-
(2002)
NET Framework Security
-
-
LaMacchia, B.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.5
-
16
-
-
84944878224
-
Transitive signature schemes
-
B. Preneel, editor, Proceedings of The Cryptographer's Track at the RSA Conference (CT-RSA 2002), Springer, December
-
S. Micali and R. L. Rivest. Transitive signature schemes. In B. Preneel, editor, Proceedings of The Cryptographer's Track at the RSA Conference (CT-RSA 2002), volume 2271 of Lecture Notes in Computer Science, pages 236-243. Springer, December 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2271
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
18
-
-
33646041848
-
-
Available online, October Slides from talk given at Cambridge University. [Last accessed: February 19, 2003]
-
R. Rivest. Two signature schemes. Available online, October 2000. Slides from talk given at Cambridge University. [Last accessed: February 19, 2003] http://theory.lcs.mit.edu/∼rivest/publications.html.
-
(2000)
Two Signature Schemes
-
-
Rivest, R.1
-
19
-
-
74549116915
-
-
Available online, Nov. 12 Last accessed: February 25, 2003
-
D. Sax. DNS spoofing (malicious cache poisoning). Available online, Nov. 12 2000. [Last accessed: February 25, 2003] http://www.sans.org/rr/firewall/ DNSspoof.php.
-
(2000)
DNS Spoofing (Malicious Cache Poisoning)
-
-
Sax, D.1
-
20
-
-
84949982830
-
Content extraction signatures
-
Proceedings of The 4th International Conference on Information Security and Cryptology (ICISC 2001), Springer, December
-
R. Steinfeld, L. Bull, and Y. Zheng. Content extraction signatures. In Proceedings of The 4th International Conference on Information Security and Cryptology (ICISC 2001), volume 2288 of Lecture Notes in Computer Science, pages 285-304. Springer, December 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2288
, pp. 285-304
-
-
Steinfeld, R.1
Bull, L.2
Zheng, Y.3
|