-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
ACM
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems". Commun. ACM, ACM, 1978, 21, 120-126
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
84871955504
-
-
Assuria Log Manager, Assuria Ltd. Last Accessed 7th June 2012
-
Assuria Log Manager, Assuria Ltd. http://www.assuria.com/products-new/ assuria-log-manager/features.html Last Accessed 7th June 2012
-
-
-
-
4
-
-
17144363655
-
Cryptoanalysis of RSA system of enciphering with public key
-
R. Popovych, "Cryptoanalysis of RSA system of enciphering with public key". Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2004. Proceedings of the International Conference, 2004, 301-302
-
Modern Problems of Radio Engineering, Telecommunications and Computer Science, 2004. Proceedings of the International Conference, 2004
, pp. 301-302
-
-
Popovych, R.1
-
7
-
-
0018545449
-
How to share a secret
-
ACM
-
A. Shamir, "How to share a secret", Commun. ACM, ACM, 1979, 22, 612-613
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
8
-
-
85062838317
-
Safeguarding cryptographic keys
-
IEEE Computer Society, 0
-
G. R. Blakley, "Safeguarding cryptographic keys". Managing Requirements Knowledge, International Workshop on, IEEE Computer Society, 1979, 0, 313
-
(1979)
Managing Requirements Knowledge, International Workshop on
, pp. 313
-
-
Blakley, G.R.1
-
9
-
-
84948954277
-
Practical Threshold Signatures
-
V. Shoup, "Practical Threshold Signatures". EUROCRYPT'00, 2000, 207-220
-
(2000)
EUROCRYPT'00
, pp. 207-220
-
-
Shoup, V.1
-
12
-
-
34547359866
-
Data Dependence-based Optimistic Data Consistency Maintenance Method
-
J. Zhou, Y. Wang, and S. Li, "Data Dependence-based Optimistic Data Consistency Maintenance Method". Computer and Information Technology, 2006. CIT '06. The Sixth IEEE International Conference on, 2006, 120
-
Computer and Information Technology, 2006. CIT '06. The Sixth IEEE International Conference on, 2006
, pp. 120
-
-
Zhou, J.1
Wang, Y.2
Li, S.3
-
13
-
-
70349504347
-
Research on Distributed Architecture Based on SOA
-
IEEE Computer Society, 0
-
H. Li, and Z. Wu, "Research on Distributed Architecture Based on SOA". Communication Software and Networks, International Conference on, IEEE Computer Society, 2009, 0, 670-674
-
(2009)
Communication Software and Networks, International Conference on
, pp. 670-674
-
-
Li, H.1
Wu, Z.2
-
16
-
-
60449100156
-
The Design of a Generic Intrusion-Tolerant Architecture for Web Servers
-
Jan.-March doi: 10.1109/TDSC.2008.1
-
A. Saidane, V. Nicomette, and Y. Deswarte, "The Design of a Generic Intrusion-Tolerant Architecture for Web Servers" Dependable and Secure Computing, IEEE Transactions on , vol.6, no.1, pp.45-58, Jan.-March 2009 doi: 10.1109/TDSC.2008.1
-
(2009)
Dependable and Secure Computing, IEEE Transactions on
, vol.6
, Issue.1
, pp. 45-58
-
-
Saidane, A.1
Nicomette, V.2
Deswarte, Y.3
-
17
-
-
81155126270
-
Optimal voting strategy against rational attackers
-
vol., no., 26-28 Sept. doi: 10.1109/CRiSIS.2011.6061841
-
Li Wang, Zheng Li, Shangping Ren, and K. Kwiaty, "Optimal voting strategy against rational attackers," Risk and Security of Internet and Systems (CRiSIS), 2011 6th International Conference on , vol., no., pp.1-8, 26-28 Sept. 2011 doi: 10.1109/CRiSIS.2011.6061841
-
(2011)
Risk and Security of Internet and Systems (CRiSIS), 2011 6th International Conference on
, pp. 1-8
-
-
Wang, L.1
Li, Z.2
Ren, S.3
Kwiaty, K.4
-
19
-
-
84871943682
-
-
AlienVault Risk Metrics http://www.alienvault.com/wiki/doku.php?id=user- manual:dashboards:risk:risk-metrics
-
AlienVault Risk Metrics
-
-
-
20
-
-
84871985530
-
-
Scenario Requirements http://www.massif-project.eu/sites/default/files/ deliverables/D2.1.1-Scenario-Requirements-v1.0-public.pdf
-
Scenario Requirements
-
-
|