-
1
-
-
0030649084
-
Surviving information warfare attacks on databases
-
IEEE Computer Society Press, May
-
P. Ammann, S. Jnjodia, C. McCollum, and B. Biaustdn. Surviving information warfare attacks on databases. In proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 164-174. IEEE Computer Society Press, May 1997.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 164-174
-
-
Ammann, P.1
Jnjodia, S.2
McCollum, C.3
Biaustdn, B.4
-
2
-
-
85062838317
-
Safeguarding cryptographic keys
-
American Federation of Information Processing Societies, AFJPS Press
-
G. R. Blakley. Safeguarding cryptographic keys. In Proceedings of the Notional Computer Conference, pages 313-317-American Federation of Information Processing Societies, AFJPS Press, 1979.
-
(1979)
Proceedings of the Notional Computer Conference
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
84961369151
-
Security of ramp schemes
-
G. R. Blakley and David Chaum, editors, Springer-Verlag LNCS
-
G. R. Blakley and C. A. Meadows. Security of ramp schemes. In G. R. Blakley and David Chaum, editors. Proceedings of Crypto '84, pages 242-268, Springer-Verlag LNCS 196, 1984.
-
(1984)
Proceedings of Crypto '84
, vol.196
, pp. 242-268
-
-
Blakley, G.R.1
Meadows, C.A.2
-
5
-
-
0002911802
-
Some recent research results in threshold cryptography
-
E. Okamoto, G. Davida, and M. Mambo, editors. Springer-Verlag LNCS 1396
-
Yvo Desmedt. Some recent research results in threshold cryptography. In E. Okamoto, G. Davida, and M. Mambo, editors. Information Security. Proceedings, pages 158-173. Springer-Verlag LNCS 1396, 1997.
-
(1997)
Information Security. Proceedings
, pp. 158-173
-
-
Desmedt, Y.1
-
8
-
-
0032047528
-
Design and assurance strategy for the NRL Pump
-
April
-
Myong Kang, Andrew Moore, and Ira Moskowiiz. Design and assurance strategy for the NRL Pump. IEEE Computer Magazine, 31 (4), April 1998.
-
(1998)
IEEE Computer Magazine
, vol.31
, Issue.4
-
-
Kang, M.1
Moore, A.2
Moskowiiz, I.3
-
12
-
-
84955619209
-
Applying the dependability paradigm to computer security
-
IEEE Computer Society Press
-
Catherine Meadows. Applying the dependability paradigm to computer security. In Proceedings of the 1995New Security Paradigms Workshop. IEEE Computer Society Press, 1996.
-
(1996)
Proceedings of the 1995New Security Paradigms Workshop
-
-
Meadows, C.1
-
17
-
-
84964479786
-
Experimenting with quantitative evaluation tools for monitoring operational security
-
In M Dal Cin, C. Meadows, and W. H. Sanders, editors. IEEE Computer Society
-
R. Ortalo, Y. Deswarte, and M. Kaanidie, Experimenting with quantitative evaluation tools for monitoring operational security. In M. Dal Cin, C. Meadows, and W. H. Sanders, editors, Dependable Computing for Critical Applications 6, pages 307-328. IEEE Computer Society, 1998.
-
(1998)
Dependable Computing for Critical Applications
, vol.6
, pp. 307-328
-
-
Ortalo, R.1
Deswarte, Y.2
Kaanidie, M.3
-
20
-
-
0018545449
-
How to share a secret
-
Adi Shamir. How to share a secret. Communications of ihe ACM, 22: 612-613r 1979.
-
(1979)
Communications of Ihe ACM
, vol.22
, pp. 612-613r
-
-
Shamir, A.1
|