-
1
-
-
85104918341
-
-
ES Announcement, last accessed April 6, 2013
-
http://csrc.nist.gov/publications/fips/fips197/fips -197.pdf ES Announcement, last accessed April 6, 2013
-
-
-
-
2
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R.L.Rivest, A. Shamir; L. Adleman "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 1978.
-
(1978)
Communications of the ACM
, vol.21
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
85104928621
-
-
last accessed April, 6, 2013
-
http://csrc.nist.gov/groups/ST/hash/sha-3/winner_sha3.html last accessed April, 6, 2013
-
-
-
-
4
-
-
0001604533
-
Blind signature for untraceable payments
-
Springer Verlag, p
-
D. Chaum., “Blind signature for untraceable payments”, Advances in Cryptology – Crypto - 82, Springer Verlag, p.p. 199-203
-
Advances in Cryptology – Crypto - 82
, pp. 199-203
-
-
Chaum, D.1
-
8
-
-
79960033523
-
Learning Digital Cashless Applications with Consolidation of Authenticity, Confidentiality and Integrity using SequenceDiagrams
-
Dubai May
-
A. Herath,., S Herath. et al, “Learning Digital Cashless Applications with Consolidation of Authenticity, Confidentiality and Integrity using SequenceDiagrams”, Conference on Computer Science, Engineering and Applications, Dubai May 2011
-
(2011)
Conference on Computer Science, Engineering and Applications
-
-
Herath, A.1
Herath, S2
-
9
-
-
85058048686
-
Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance theInformation Assurance and Security Education
-
Y. Albastaki, A. Herath, “Secure Digital Cashless Transactions with Sequence Diagrams and Spatial Circuits to Enhance theInformation Assurance and Security Education”, International Journal of Advanced Computer Science and Applications,Vol. 3, No.4, 2012.
-
(2012)
International Journal of Advanced Computer Science and Applications
, vol.3
, Issue.4
-
-
Albastaki, Y.1
Herath, A.2
-
10
-
-
0023247970
-
Efficient and timely mutual authentication
-
D.Otway, O.Rees,"Efficient and timely mutual authentication". Operating Systems Review, 1987, 21 8 - 10.
-
(1987)
Operating Systems Review
, vol.21
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
11
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
September
-
Neuman B. C.; T'so T. Y., “Kerberos: An Authentication Service for Computer Networks”, IEEE Communications Magazine, September, 1994.
-
(1994)
IEEE Communications Magazine
-
-
Neuman, B. C.1
T'so, T. Y.2
-
14
-
-
85104913479
-
-
NIST's SHA-3 Contest: last accessed April, 6, 2013
-
http://csrc.nist.gov/groups/ST/hash/sha-3/index.html NIST's SHA-3 Contest: last accessed April, 6, 2013
-
-
-
-
15
-
-
85104908132
-
-
at.el
-
F. Niels, S. Lucks, B. Schneier, D. Whiting, M. Bellare, T.Kohno, J.Callas,at.el . “The Skein Hash Function Family”, http://www.skeinhash.info/sites/default/files/skein1.1.pdf
-
The Skein Hash Function Family
-
-
Niels, F.1
Lucks, S.2
Schneier, B.3
Whiting, D.4
Bellare, M.5
Kohno, T.6
Callas, J.7
-
18
-
-
0037250327
-
Verifying the SET Registration Protocols
-
last accessed April, 6, 2013
-
B. Giampaolo; Massacci, F;. and Paulson, L. “Verifying the SET Registration Protocols.” Proceedings of IEEE Journal of Selected Areas inCommunications 2003.http://www.cl.cam.ac.uk/~lp15/papers/Bella/registration.pdf, last accessed April, 6, 2013
-
Proceedings of IEEE Journal of Selected Areas inCommunications 2003
-
-
Giampaolo, B.1
Massacci, F2
Paulson, L.3
-
19
-
-
85104913893
-
-
last accessed April, 6, 2013
-
https://www.schneier.com/paper-blowfish-fse.html last accessed April, 6, 2013
-
-
-
|