-
14
-
-
0346358776
-
Prudent engineering practice for cryptographic protocols
-
Digital Corporation, Palo Alto
-
Abadi M., Needham R.: Prudent Engineering Practice for Cryptographic Protocols. SRC Research Report No. 125, Digital Corporation, Palo Alto (1994)
-
(1994)
SRC Research Report No. 125
-
-
Abadi, M.1
Needham, R.2
-
19
-
-
0030679849
-
A Public-key cryptosystem with worst-case / average-case equivalence
-
New York
-
Ajtai M., Dwork C: A Public-Key Cryptosystem with Worst-Case / Average-Case Equivalence. Proceedings of the 29th ACM STOC, ACM, New York (1997)
-
(1997)
thACM STOC, ACM
-
-
Ajtai, M.1
Dwork, C.2
-
20
-
-
0038579798
-
International legal aspects of cryptography
-
Elsevier
-
Aljifri H., Sanchez D. N.: International Legal Aspects of Cryptography. Computers & Security, Vol. 22, No. 3, pp. 196-203, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.3
, pp. 196-203
-
-
Aljifri, H.1
Sanchez, D.N.2
-
21
-
-
84892823372
-
-
ATIS Committee T1A1, Ref, Gaithersburg. Tl.523-2001
-
Alliance for Telecommunications Industry Solutions: ATIS Telecom Glossary 2000, ATIS Committee T1A1, Ref. Tl.523-2001, NIST, Gaithersburg, (2001), http://www.atis.org/tg2k
-
(2001)
NIST
-
-
-
22
-
-
0038443107
-
A New taxonomy of web attacks suitable for efficient encoding
-
Elsevier
-
Alvarez G., Petrović S.: A New Taxonomy of Web Attacks Suitable for Efficient Encoding. Computers & Security, Vol. 22, No. 5, pp. 435-449, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 435-449
-
-
Alvarez, G.1
Petrović, S.2
-
23
-
-
4944238084
-
-
American National Standards Institute, Standard X9.17, Washington D.C.
-
American National Standards Institute: Financial Institution Key Management (Wholesale). Standard X9.17, Washington D.C., (1985)
-
(1985)
Financial Institution Key Management (Wholesale)
-
-
-
25
-
-
43149116934
-
Preliminary system dynamics maps of the insider cyber threat problem
-
John Wiley & Sons, Oxford
-
Anderson D. et al.: Preliminary System Dynamics Maps of the Insider Cyber Threat Problem. John Wiley & Sons, Proceedings of the 22nd Conference of the SDS, Oxford, (2004)
-
(2004)
nd Conference of the SDS
-
-
Anderson, D.1
-
29
-
-
84892799866
-
-
John Wiley & Sons, New York
-
Annoni M., Javornik T., Kandus G., Mohorčič M., Švigelj A., Trček D., Hu Y.F., Maral G., Ferro E.: Service Efficient Network Interconnection Via Satellite. John Wiley & Sons, New York, (2001)
-
(2001)
Service Efficient Network Interconnection Via Satellite
-
-
Annoni, M.1
Javornik, T.2
Kandus, G.3
Mohorčič, M.4
Švigelj, A.5
Trček, D.6
Hu, Y.F.7
Maral, G.8
Ferro, E.9
-
31
-
-
33745186968
-
-
Association of Chief Police Officers. Computer Crime Group, London
-
Association of Chief Police Officers :Good Practice Guide for Computer Based Evidence. Computer Crime Group, London, (2003)
-
(2003)
Good Practice Guide for Computer Based Evidence
-
-
-
32
-
-
0036832911
-
Breakthrough in privacy concerns and lawful access conflicts
-
Elsevier
-
Ayoade J. O., Kosuge T.: Breakthrough in Privacy Concerns and Lawful Access Conflicts. Telematics and Informatics, Vol. 19, No. 4, pp. 273-289, Elsevier, (2002)
-
(2002)
Telematics and Informatics
, vol.19
, Issue.4
, pp. 273-289
-
-
Ayoade, J.O.1
Kosuge, T.2
-
33
-
-
0038703578
-
-
Baker & Mc Kenzie, Chicago
-
Baker & Mc Kenzie: Global E-Commerce Law. Baker & Mc Kenzie, Chicago, (2002), http://www.bmck.com/ecommerce/intlegis-t.htm
-
(2002)
Global E-Commerce Law
-
-
-
34
-
-
24944558281
-
The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS algorithms
-
Reston
-
Baldwin R., Rivest R.: The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. IETF RFC 2040, Reston, (1996)
-
(1996)
IETF RFC
, vol.2040
-
-
Baldwin, R.1
Rivest, R.2
-
35
-
-
33846668743
-
Penetration and social engineering - Hacking the weakest link
-
Elsevier
-
Barrett N.: Penetration and Social Engineering - Hacking the Weakest Link. Information Security Technical Report, Vol. 8, No. 4. pp. 56-64, Elsevier, (2003)
-
(2003)
Information Security Technical Report
, vol.8
, Issue.4
, pp. 56-64
-
-
Barrett, N.1
-
36
-
-
0043026142
-
-
W3C REC-xmldsig-core-20020212 Cambridge / Sophia Antipolis / Kanagawa
-
Bartel M., Boyer J., Fox B., LaMacchia B., Simon B.: XML-Signature Syntax and Processing. W3C REC-xmldsig-core-20020212, Cambridge / Sophia Antipolis / Kanagawa, (2002), http://www.w3.org/TR/2002/REC-xmldsig-core-20020212
-
(2002)
XML-Signature Syntax and Processing
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
Lamacchia, B.4
Simon, B.5
-
40
-
-
84979807255
-
Eu data protection policy
-
Elsevier
-
Bergkamp L.: EU Data Protection Policy. Computer Law & Security, Vol. 18, No. 1. pp. 31-47, Elsevier, (2002)
-
(2002)
Computer Law & Security
, vol.18
, Issue.1
, pp. 31-47
-
-
Bergkamp, L.1
-
41
-
-
84892811114
-
Calculated risk
-
Online, December 2002, CXO Media Inc., Framingham
-
Berinato S.: Calculated Risk. CSO Online, December 2002, CXO Media Inc., Framingham, (2002), http://www.csoonline.com/read/120902/calculate.html
-
(2002)
CSO
-
-
Berinato, S.1
-
42
-
-
0003272324
-
Uniform Resource Identifiers (URI) -generic syntax
-
Reston
-
Berners-Lee T, Fielding R., Masinter L.: Uniform Resource Identifiers (URI) -Generic Syntax. IETF RFC 2396 Reston (1998)
-
(1998)
IETF RFC
, vol.2396
-
-
Berners-Lee, T.1
Fielding, R.2
Masinter, L.3
-
45
-
-
0021522644
-
How to generate cryptographically strong sequences of pseudo-random bits
-
SIAM
-
Blum M., Micali S.: How to Generate Cryptographically Strong Sequences of Pseudo-Random Bits. Journal on Computing, Vol. 13., No. 4., pp. 850-864, SIAM, (1984)
-
(1984)
Journal on Computing
, vol.13
, Issue.4
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
46
-
-
0022716288
-
A Simple unpredictable pseudo-random number generator
-
SIAM
-
Blum L., Blum M., Shub M.: A Simple Unpredictable Pseudo-Random Number Generator. Journal on Computing, Vol. 15, No. 2, pp. 364-383, SIAM, (1986)
-
(1986)
Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
47
-
-
0141972446
-
Security analysis of XML usage and XML parsing
-
Elsevier
-
Blyth A., CunlifFe D., Sutherland I.: Security Analysis of XML Usage and XML Parsing. Computers & Security, Vol. 22, No. 6, pp. 494-505, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 494-505
-
-
Blyth, A.1
Cunliffe, D.2
Sutherland, I.3
-
48
-
-
85088759149
-
Collisions for the compress functions of md5
-
Springer Verlag, Heidelberg
-
Boer B., Bosselaers A.: Collisions for the Compress Functions of MD5. Euro-crypt '93 Lecture Notes in Computer Science, Vol; 773, pp. 294-304, Springer Verlag, Heidelberg, (1993)
-
(1993)
Euro-crypt '93 Lecture Notes in Computer Science
, vol.773
, pp. 294-304
-
-
Boer, B.1
Bosselaers, A.2
-
49
-
-
34247550528
-
From System Dynamics and Discrete Event to Practical Agent Based Modelling - Reasons Techniques Tools
-
John Wiley & Sons, Oxford
-
Borshchev A., Filippov A.: From System Dynamics and Discrete Event to Practical Agent Based Modelling - Reasons, Techniques, Tools. John Wiley & Sons, Proceedings of the 22nd Conference of the SDS, Oxford, (2004)
-
(2004)
nd Conference of the SDS
-
-
Borshchev, A.1
Filippov, A.2
-
50
-
-
0008688820
-
Guide to the W3C XML specification DTD, version 2.1
-
Cambridge / Sophia Antipolis / Kanagawa
-
Bosak J., Bray T., Connolly D., Maler E., Nicol G., Sperberg-McQueen C, Wood L., Clark J. (editors):"Guide to the W3C XML Specification DTD, Version 2.1. W3C DTD Specification Version 2.1, Cambridge / Sophia Antipolis / Kanagawa, (1998), http://www.w3.org/XML/1998/06/xmlspec-report-v21.htm#AEN49
-
(1998)
W3C DTD Specification Version 2.1
-
-
Bosak, J.1
Bray, T.2
Connolly, D.3
Maler, E.4
Nicol, G.5
Sperberg-Mcqueen, C.6
Wood, L.7
Clark, J.8
-
51
-
-
0027612025
-
Security Architectures Using formal Methods
-
IEEE
-
Boyd C: Security Architectures Using formal Methods. IEEE Journal on Selected Areas in Communications, Vol. 11, No. 3, pp. 694-701, IEEE, (1993)
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.3
, pp. 694-701
-
-
Boyd, C.1
-
52
-
-
0038688046
-
The origins and the development of the ASM method for high level system design and analysis
-
Graz
-
Börger E.: The Origins and the Development of the ASM Method for High Level System Design and Analysis. Journal of Universal Computer Science, Vol. 8, No. 1, pp. 2-74, Graz, (2002)
-
(2002)
Journal of Universal Computer Science
, vol.8
, Issue.1
, pp. 2-74
-
-
Börger, E.1
-
53
-
-
25144503410
-
-
Cambridge / Sophia Antipolis / Kanagawa
-
Bray T., Paoli J., Sperberg-McQueen CM., Maler E., Yergeau F. (editors): Extensible Markup Language (XML) 1.1. W3C REC-xmlll-20040204, Cambridge / Sophia Antipolis / Kanagawa, (2004), http://www.w3.org/TR/xmlll/
-
(2004)
Extensible Markup Language (XML)1.1. W3C REC-xmlll-20040204
-
-
Bray, T.1
Paoli, J.2
Sperberg-Mcqueen, C.M.3
Maler, E.4
Yergeau, F.5
-
57
-
-
11844282456
-
-
British Standards Institute: BSI, BS 7799-2, London
-
British Standards Institute: Information Security Management Systems. BSI, BS 7799-2, London, (2002)
-
(2002)
Information Security Management Systems
-
-
-
60
-
-
0004215976
-
Logic of authentication
-
Digital Equipment Corporation - DEC
-
Burrows M., Abadi M., Needham R.: Logic of Authentication. SRC Research Report Number 39, Digital Equipment Corporation - DEC, (1989), http://gatekeeper.research.compaq.com/pub/DEC/SRC/research-reports/abstracts/ src-rr-039.html
-
(1989)
SRC Research Report Number 39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
61
-
-
0025386404
-
Logic of authentication
-
ACM, New York
-
Burrows M., Abadi M., Needham R.: Logic of Authentication. ACM Transactions on Computer Systems, Vol. 8, No. 1, pp. 18-36, ACM, New York, (1990)
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
62
-
-
84979797869
-
Adequate Security - What Exactly Do You Mean?
-
Elsevier
-
Buzzard K.: Adequate Security - What Exactly Do You Mean? Computer Law & Security, Vol. 19, No. 5, pp. 406-410, Elsevier, (2003)
-
(2003)
Computer Law & Security
, vol.19
, Issue.5
, pp. 406-410
-
-
Buzzard, K.1
-
65
-
-
44949218700
-
-
OASIS saml-core-2.0-os, Billerica
-
Cantor S., Kemp J., Philpott R., Maler E. (editors): Assertions and Protocols for the OASIS Security Assertion Markup Language v 2.0. OASIS saml-core-2.0-os, Billerica, (2005), http://docs.oasis-open.Org/security/saml/ v2.0/
-
(2005)
Assertions and Protocols for the OASIS Security Assertion Markup Language v 2.0
-
-
Cantor, S.1
Kemp, J.2
Philpott, R.3
Maler, E.4
-
66
-
-
84979819463
-
Data Protection - Security/Data Security - The Key to Privacy
-
Elsevier
-
Carey P., Rüssel C: Data Protection - Security/Data Security - The Key to Privacy. Computer Law & Security Report, Vol. 18, No. 2, pp. 112-113, Elsevier, (2002)"
-
(2002)
Computer Law & Security Report
, vol.18
, Issue.2
, pp. 112-113
-
-
Carey, P.1
Rüssel, C.2
-
67
-
-
84892796223
-
-
Center for Democracy & Technology. Center for Democracy & Technology, Washington D.C
-
Center for Democracy & Technology: Anti-Spyware Legislation on Fast Track Through House. Center for Democracy & Technology, Washington D.C., (2004), http: //www.cdt.org/privacy/spy ware/
-
(2004)
Anti-Spyware Legislation on Fast Track Through House
-
-
-
68
-
-
34249040787
-
-
CERT, Pittsburgh
-
CERT/CC: CERT/CC " Advisories. CERT, Pittsburgh, (2005), http: / / www xert.org/advisories/
-
(2005)
CERT/CC Advisories
-
-
-
70
-
-
85057633068
-
Experiences of using pki to access a hospital information system by high street opticians
-
Chadwick D.W., Mundy D., New J.: Experiences of Using PKI to Access a Hospital Information System by High Street Opticians. Computer Communications, Vol. 26, No )
-
Computer Communications
, vol.26
-
-
Chadwick, D.W.1
Mundy, D.2
New, J.3
-
72
-
-
3342911529
-
-
SAMS Publishing Indianapolis
-
Chase N.: XML Primer Plus. SAMS Publishing, Indianapolis, (2003)
-
(2003)
XML Primer Plus
-
-
Chase, N.1
-
74
-
-
0022145479
-
Security without identification - Transaction systems to make the big brother obsolete
-
New York
-
Chaum D.: Security Without Identification - Transaction Systems to Make the big Brother Obsolete. Communications of the ACM, Vol. 28, No. 10, pp. 10301044, New York, (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 10301044
-
-
Chaum, D.1
-
76
-
-
26444601400
-
Online cash checks
-
Springer Verlag
-
Chaum D.: Online Cash Checks. Proceedings of Eurocrypt '89, pp. 288-293, Springer Verlag, (1990)
-
(1990)
Proceedings of Eurocrypt '89
, pp. 288-293
-
-
Chaum, D.1
-
79
-
-
0003791651
-
-
W3C 2001/NOTE-wsdl-20010315, Cambridge / Sophia Antipolis / Kanagawa
-
Christensen E., Curbera F., Meredith G., Weerawarana S.: Web Services Description Language (WSDL) v 1.1. W3C 2001/NOTE-wsdl-20010315, Cambridge / Sophia Antipolis / Kanagawa, (2001), http://www.w3.org/TR/2001/NOTE-wsdl- 20010315
-
(2001)
Web Services Description Language (WSDL) v 1.1.
-
-
Christensen, E.1
Curbera, F.2
Meredith, G.3
Weerawarana, S.4
-
81
-
-
0003587590
-
-
W3C REC-xpath-19991116, Cambridge / Sophia Antipolis / Kanagawa
-
Clark J., DeRose S.: XML Path Language (XPath) v 1.0. W3C REC-xpath-19991116, Cambridge / Sophia Antipolis / Kanagawa, (1999), http://www.w3.org/TR/1999/REC-xpath-19991116
-
(1999)
XML Path Language (XPath), v 1.0
-
-
Clark, J.1
Derose, S.2
-
82
-
-
0003420124
-
-
W3C REC-xslt-19991116, Cambridge / Sophia Antipolis / Kanagawa
-
Clark J.: XSL Transformations (XSLT) v 1.0. W3C REC-xslt-19991116, Cambridge / Sophia Antipolis / Kanagawa, (1999), http://www.w3.org/TR/1999/REC- xslt-19991116
-
(1999)
XSL Transformations (XSLT) v 1.0
-
-
Clark, J.1
-
83
-
-
84892810411
-
-
OASIS, Billerica
-
Clement L., Hatley A., von Riegen C, Rogers T. (editors): UDDI v 3.0.2. OASIS, Billerica, (2004), http://uddi.Org/pubs/uddi-v3.0.2-20041019.htm
-
(2004)
UDDI v 3.0.2
-
-
Clement, L.1
Hatley, A.2
Von Riegen, C.3
Rogers, T.4
-
85
-
-
0142125896
-
Formal verification - An imperative step in the design of security protocols
-
Elsevier
-
Coffey T., Dojen R., Flanaga T.: Formal Verification - An Imperative Step in the Design of Security Protocols. Computer Networks, Vol. 2003, No. 43, pp. 601-618, Elsevier, (2003)
-
(2003)
Computer Networks
, vol.2003
, Issue.43
, pp. 601-618
-
-
Coffey, T.1
Dojen, R.2
Flanaga, T.3
-
86
-
-
0030701247
-
Information system attacks: A preliminary classification scheme
-
Elsevier
-
Cohen F.B.: Information System Attacks: A Preliminary Classification Scheme. Computers & Security, Vol. 16, No. 1, pp. 29-46, Elsevier, (1997)
-
(1997)
Computers & Security
, vol.16
, Issue.1
, pp. 29-46
-
-
Cohen, F.B.1
-
87
-
-
0141903338
-
Operationalizing IT risk management
-
Elsevier
-
Coles R.S., Moulton R.: Operationalizing IT Risk Management. Computers & Security, Vol. 22, No. 6, pp. 487-493, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.6
, pp. 487-493
-
-
Coles, R.S.1
Moulton, R.2
-
89
-
-
0242724106
-
Society cannot function without privacy
-
IEEE
-
Coloyannides M.: Society Cannot Function Without Privacy. Security & Privacy, Vol. 2, No. 3, pp. 84-86, IEEE, (2003)
-
(2003)
Security & Privacy
, vol.2
, Issue.3
, pp. 84-86
-
-
Coloyannides, M.1
-
91
-
-
84892809327
-
On the protection of personal data used for employment
-
Strasbourg
-
Council of Europe: On the Protection of Personal Data Used for Employment. Recommendation No. R (89) 2, Strasbourg, (1989), http://cm.coe.int/ta/rec/1989/89r2.htm
-
(1989)
Recommendation No. R (89) 2
-
-
-
92
-
-
84892818670
-
-
Budapest
-
Council of Europe: CyberCrime Convention. ETS No. 185, Budapest, (2001), http://conventions.coe.int/Treaty/EN/Treaties/Html/185.htm
-
(2001)
CyberCrime Convention. ETS No. 185
-
-
-
93
-
-
84892819243
-
P3P Guiding principles
-
Cambridge / Sophia Antipolis / Kanagawa
-
Crannor L.F. (editor): P3P Guiding Principles. W3C Recommendation NOTE-P3P10-principles-19980721, Cambridge / Sophia Antipolis / Kanagawa, (2002), http://www.w3.org/TR/1998/NOTE-P3P10-principles-19980721
-
(2002)
W3C Recommendation NOTE-P3P10-principles-19980721
-
-
Crannor, L.F.1
-
95
-
-
1942537188
-
Computer forensics - Past present and future
-
Elsevier
-
Culley A.: Computer Forensics - Past, Present and Future. Information Security Technical Report, Vol. 8, No. 2, pp. 32-36, Elsevier, (2003)
-
(2003)
Information Security Technical Report
, vol.8
, Issue.2
, pp. 32-36
-
-
Culley, A.1
-
97
-
-
0141793000
-
Incident response
-
Elsevier
-
David J.: Incident Response. Network Security, Vol. 2003, No. 9. pp. 17-19, Elsevier, (2003)
-
(2003)
Network Security
, vol.2003
, Issue.9
, pp. 17-19
-
-
David, J.1
-
99
-
-
0030107190
-
A taxonomy for key escrow encryption systems
-
ACM
-
Denning D.E., Brandstad D.K.: A Taxonomy for Key Escrow Encryption Systems. Communications of the ACM, Vol. 39, No. 3, pp. 34-40, ACM, (1996)
-
(1996)
Communications of the ACM
, vol.39
, Issue.3
, pp. 34-40
-
-
Denning, D.E.1
Brandstad, D.K.2
-
101
-
-
0036329257
-
Steganographic method for secure communications
-
Elsevier
-
Der-Chyuan L., Jiang-Lung L.: Steganographic Method for Secure Communications. Computers & Security, Vol. 21, No. 5, pp. 449-460, Elsevier, (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 449-460
-
-
Der-Chyuan, L.1
Jiang-Lung, L.2
-
102
-
-
0032715216
-
Survival is Not Compulsory
-
Elsevier
-
Devargas M.: Survival is Not Compulsory. Computers & Security, Vol. 18, No. 1, pp. 35-46, Elsevier, (1999)
-
(1999)
Computers & Security
, vol.18
, Issue.1
, pp. 35-46
-
-
Devargas, M.1
-
103
-
-
0017018484
-
New directions in cryptography
-
New York
-
Diffie W., Hellman M.: New Directions in Cryptography. Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, New York, (1976)
-
(1976)
Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
104
-
-
0017501281
-
Exhaustive cryptanalysis of the NBS data encryption standard
-
IEEE
-
Diffie W., Hellman M.: Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, Vol. 10, No. 6, pp. 74-84, IEEE, (1977)
-
(1977)
Computer
, vol.10
, Issue.6
, pp. 74-84
-
-
Diffie, W.1
Hellman, M.2
-
107
-
-
0001849866
-
The Status of MD5 after a Recent Attack
-
RS A Labs, Redwood City
-
Dobbertin H.: The Status of MD5 After a Recent Attack. CryptoBytes, Vol. 2, No. 3, pp. 1-6, RS A Labs, Redwood City, (1996)
-
(1996)
CryptoBytes
, vol.2
, Issue.3
, pp. 1-6
-
-
Dobbertin, H.1
-
114
-
-
84892827215
-
Electronic privacy information center: Privacy law sourcebook
-
Washington D.C
-
Electronic Privacy Information Center: Privacy Law Sourcebook. EPIC, Washington D.C., (2001)
-
(2001)
EPIC
-
-
-
115
-
-
84874800178
-
A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
-
IEEE
-
ElGamal T.: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, IEEE, (1985)
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
116
-
-
0003593599
-
-
IETF RFC 2693 Reston
-
Ellison C, Frantz B., Lampson B., Rivest R., Thomas B., Ylonnen T.: SPKI Certificate Theory. IETF RFC 2693, Reston, (1999)
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonnen, T.6
-
117
-
-
84892828614
-
Data Protection Directive, 95/64/EC
-
European Commission L 281, 23/11/1995, Brussels
-
European Commission: Data Protection Directive, 95/64/EC. Official Journal of the European Communities, L 281, 23/11/1995, Brussels, (1995)
-
(1995)
Official Journal of the European Communities
-
-
-
118
-
-
84892789395
-
Telecommunications Data Protection Directive, 97/66/EC
-
European Commission L 024, 30/1/1998, Brussels
-
European Commission: Telecommunications Data Protection Directive, 97/66/EC. Official Journal of the European Communities, L 024, 30/1/1998, Brussels, (1998)
-
(1998)
Official Journal of the European Communities
-
-
-
119
-
-
84892796118
-
Setting up a Community Regime for the Control of Exports of Dual-use Items and Technology
-
European Commission L 159, 30/06/2000, Brussels
-
European Commission: Setting up a Community Regime for the Control of Exports of Dual-use Items and Technology. Official Journal of the European Communities, L 159, 30/06/2000, Brussels, (2000)
-
(2000)
Official Journal of the European Communities
-
-
-
120
-
-
84892813257
-
Amending regulation with regard to intracommunity transfers and exports of dual-use items and technology
-
European Commission L 336, 30/12/2000, Brussels
-
European Commission: Amending Regulation with Regard to IntraCommunity Transfers and Exports of Dual-use Items and Technology. Official Journal of the European Communities, L 336, 30/12/2000, Brussels, (2000)
-
(2000)
Official Journal of the European Communities
-
-
-
121
-
-
84892808808
-
A Community framework for electronic signatures, 1999/93/ec
-
European Commission L 013, 19/01/2000, Brussels
-
European Commission: A Community Framework for Electronic Signatures, 1999/93/EC. Official Journal of the European Communities, L 013, 19/01/2000, Brussels, (2000)
-
(2000)
Official Journal of the European Communities
-
-
-
122
-
-
84892805061
-
Amending regulation with regard to the list of controlled dual-use items and technology when exported
-
European Commission L 065, 07/03/2001, Brussels
-
European Commission: Amending Regulation With Regard to the List of Controlled Dual-use Items and Technology When Exported. Official Journal of the European Communities, L 065, 07/03/2001, Brussels, (2001)
-
(2001)
Official Journal of the European Communities
-
-
-
123
-
-
84892803090
-
Directive on the harmonization of certain aspects of copyright and related rights in the information society
-
European Commission L 167/10, 22/6/2001, Brussels
-
European Commission: Directive on the Harmonization of Certain Aspects of Copyright and Related Rights in the Information Society. Official Journal of the European Communities, L 167/10, 22/6/2001, Brussels, (2001)
-
(2001)
Official Journal of the European Communities
-
-
-
124
-
-
84892783082
-
Privacy and Electronic Communications Directive, 02/58/EC
-
European Commission L201, 31/7/2002, Brussels
-
European Commission: Privacy and Electronic Communications Directive, 02/58/EC. Official Journal of the European Communities, L201, 31/7/2002, Brussels, (2002)
-
(2002)
Official Journal of the European Communities
-
-
-
125
-
-
84892832829
-
Baseline security standards - Features and mechanisms
-
European Telecommunications Standards Institute Standard DTR/NA-002608, Sophia Antipolis
-
European Telecommunications Standards Institute: Baseline Security Standards - Features and Mechanisms. Security Techniques Advisory Group, Standard DTR/NA-002608, Sophia Antipolis, (1996)
-
(1996)
Security Techniques Advisory Group
-
-
-
127
-
-
8444231043
-
-
W3C REC-xmlschema-0-20041028, Cambridge / Sophia Antipolis / Kanagawa
-
Fallside D.C., Walmsley P. (editors): XML Schema - Primer. W3C REC-xmlschema-0-20041028, Cambridge / Sophia Antipolis / Kanagawa, (2004), http://www.w3.org/TR/xmlschema-0/
-
(2004)
XML Schema - Primer
-
-
Fallside, D.C.1
Walmsley, P.2
-
128
-
-
0037204573
-
Striking a balance between security and privacy
-
Elsevier
-
Farmer D.: Striking a Balance Between Security and Privacy. Card Technology Today, Vol. 14, No. 3, pp. 11-12, Elsevier, (2002)
-
(2002)
Card Technology Today
, vol.14
, Issue.3
, pp. 11-12
-
-
Farmer, D.1
-
130
-
-
0001820140
-
Cryptography and computer privacy
-
New York
-
Feistel H.: Cryptography and Computer Privacy. Scientific American, Scientific American, Vol. 228, No. 5, pp. 15-23, New York, (1973)
-
(1973)
Scientific American Scientific American
, vol.228
, Issue.5
, pp. 15-23
-
-
Feistel, H.1
-
131
-
-
84979792294
-
IT security outsourcing
-
Elsevier
-
Fenn C, Shooter R., Allan K.: IT Security Outsourcing. Computer Law & Security, Vol. 18, No. 2, pp. 109-111, Elsevier, (2002)
-
(2002)
Computer Law & Security
, vol.18
, Issue.2
, pp. 109-111
-
-
Fenn, C.1
Shooter, R.2
Allan, K.3
-
134
-
-
0002725436
-
Industrial dynamics - A major breakthrough for decision makers
-
Cambridge
-
Forrester J.: Industrial Dynamics - A Major Breakthrough for Decision Makers. Harvard Business Review, Vol. 36, No. 4, pp. 37-66, Cambridge, (1958)
-
(1958)
Harvard Business Review
, vol.36
, Issue.4
, pp. 37-66
-
-
Forrester, J.1
-
136
-
-
0142216142
-
Biometrics - Future abuses
-
Elsevier
-
Forte D.: Biometrics - Future Abuses. Computer Fraud & Security, Vol. 2003, No. 10, pp. 12-14, Elsevier, (2004)
-
(2004)
Computer Fraud & Security
, vol.2003
, Issue.10
, pp. 12-14
-
-
Forte, D.1
-
137
-
-
1542491274
-
-
Foundation for Intellignet Agents. FIFA SC00023J, Geneva
-
Foundation for Intellignet Agents: FIPA Agent Management Specification. FIFA SC00023J, Geneva, (2002)
-
(2002)
FIPA Agent Management Specification
-
-
-
139
-
-
26644472329
-
Secure Sockets Layer Protocol (version 3)
-
Mountain View
-
Freier, A.O., et al.: Secure Sockets Layer Protocol (version 3). Netscape Corp., Mountain View, (1996), http://wp.netscape.com/eng/ssl3/index.html
-
(1996)
Netscape Corp.
-
-
Freier, A.O.1
-
141
-
-
0038365280
-
From common criteria to elliptic curves
-
ISO
-
Fumy W.: From Common Criteria to Elliptic Curves. ISO Bulletin, Vol. 2000, No. 6, pp. 20-25, ISO, (2000)
-
(2000)
ISO Bulletin
, vol.2000
, Issue.6
, pp. 20-25
-
-
Fumy, W.1
-
142
-
-
0042468094
-
A study on the certification of the information security management systems
-
Elsevier
-
Fung R.A., Farn K.J., Lin A.C.: A Study on the Certification of the Information Security Management Systems. Computer Standards & Interfaces, Vol. 2003, No. 25, pp. 447-461, Elsevier, (2003)
-
(2003)
Computer Standards & Interfaces
, vol.2003
, Issue.25
, pp. 447-461
-
-
Fung, R.A.1
Farn, K.J.2
Lin, A.C.3
-
143
-
-
0347380853
-
Risk Management is Still Where the Money Is
-
IEEE
-
Geer D.: Risk Management is Still Where the Money Is. Computer, Vol. 36, No. 12, pp. 129-131, IEEE, (2003)
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 129-131
-
-
Geer, D.1
-
144
-
-
0035370581
-
Middleware challenges ahead
-
IEEE, Washington D.C
-
Geihs K.: Middleware Challenges Ahead, IEEE Computer, Volume 34, No. 6, pp. 24-31, IEEE, Washington D.C., (2001)
-
(2001)
IEEE Computer
, vol.34
, Issue.6
, pp. 24-31
-
-
Geihs, K.1
-
145
-
-
0042526856
-
Developing E-business trust
-
Gerberick D.: Developing E-business Trust. Security, Vol. 38, No. 9, pp. 37-40, ?, (2001)
-
(2001)
Security
, vol.38
, Issue.9
, pp. 37-40
-
-
Gerberick, D.1
-
146
-
-
0141610193
-
Cryptography and cryptographic protocols
-
Springer Verlag
-
Goldreich O.: Cryptography and Cryptographic Protocols. Distributed Computing, Vol. 16, No. 2-3, pp. 177-199, Springer Verlag, (2003)
-
(2003)
Distributed Computing
, vol.16
, Issue.2-3
, pp. 177-199
-
-
Goldreich, O.1
-
148
-
-
4344693676
-
Key recovery for the commercial environment
-
Springer Verlag, Heidelberg
-
Gonzales J. M. et al.: Key Recovery for the Commercial Environment. International Journal on Information Security, Vol. 1, No. 3, pp. 161-174, Springer Verlag, Heidelberg, (2002)
-
(2002)
International Journal on Information Security
, vol.1
, Issue.3
, pp. 161-174
-
-
Gonzales, J.M.1
-
149
-
-
79958717729
-
A framework for human factors in information security
-
HW/SW Codesign, E-Commerce and Computer Networks, Rio de Janeiro
-
Gonzalez J.J., Sawicka A.: A Framework for Human Factors in Information Security. Proceedings of the WSEAS Conference on Security, HW/SW Codesign, E-Commerce and Computer Networks, Rio de Janeiro, (2002)
-
(2002)
Proceedings of the WSEAS Conference on Security
-
-
Gonzalez, J.J.1
Sawicka, A.2
-
150
-
-
84892826352
-
From modeling to managing security - A system dynamics approach
-
Kristiansand
-
Gonzalez J.J. (editor): From Modeling to Managing Security - A System Dynamics Approach. Hoyskole Forlaget AS, Kristiansand, (2003)
-
(2003)
Hoyskole Forlaget AS
-
-
Gonzalez, J.J.1
-
151
-
-
84892793078
-
-
Government of Canada - Communications Security Establishment Government of Canada, Ottawa
-
Government of Canada - Communications Security Establishment: Canadian Handbook on Information Technology Security. Government of Canada, Ottawa, (1998)
-
(1998)
Canadian Handbook on Information Technology Security
-
-
-
152
-
-
0009481412
-
A survey of trust in internet applications
-
IEEE
-
Grandison T., Sloman M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys, Vol. 2000, No. 4, pp. 2-13, IEEE, (2000)
-
(2000)
IEEE Communications Surveys
, vol.2000
, Issue.4
, pp. 2-13
-
-
Grandison, T.1
Sloman, M.2
-
153
-
-
0035480036
-
Binding telecooperation - A formal model for electronic commerce
-
Elsevier
-
Grimm R., Ochsenschläger P.: Binding Telecooperation - A Formal Model for Electronic Commerce. Computer Networks, Vol. 2001, No. 37, pp. 171-193, Elsevier, (2001)
-
(2001)
Computer Networks
, vol.2001
, Issue.37
, pp. 171-193
-
-
Grimm, R.1
Ochsenschläger, P.2
-
154
-
-
26444514264
-
-
REC-xptr-framework-20030325, Cambridge / Sophia Antipolis / Kanagawa
-
Grosso P., Maler E., Marsh J., Walsh N. (editors): XPointer Framework. W3C REC-xptr-framework-20030325, Cambridge / Sophia Antipolis / Kanagawa, (2003), http://www.w3.org/TR/2003/REC-xptr-framework-20030325
-
(2003)
XPointer Framework. W3C
-
-
Grosso, P.1
Maler, E.2
Marsh, J.3
Walsh, N.4
-
155
-
-
0033157568
-
From active objects to autonomous agents
-
IEEE
-
Guessoum Z., Briot J.P.: From Active Objects to Autonomous Agents. IEEE Concurrency, Vol. 7, No. 3, pp. 68-76, IEEE, (1999)
-
(1999)
IEEE Concurrency
, vol.7
, Issue.3
, pp. 68-76
-
-
Guessoum, Z.1
Briot, J.P.2
-
156
-
-
1942441480
-
The art of intrusion testing
-
Elsevier
-
Gunara-Chen G.: The Art of Intrusion Testing. Information Security Technical Report, Vol. 8, No. 4, pp. 6-13, Elsevier, (2003)
-
(2003)
Information Security Technical Report
, vol.8
, Issue.4
, pp. 6-13
-
-
Gunara-Chen, G.1
-
157
-
-
33745475725
-
-
Idea Group Inc., Hershey
-
Gupta J.N.D., Sharma S.K. (editors): Intelligent enterprises of the 21s4 century. Idea Group Inc., Hershey, (2004)
-
(2004)
st Century
-
-
Gupta, J.N.D.1
Sharma, S.K.2
-
158
-
-
0036684150
-
PKI is not dead just resting
-
New York
-
Gutman P.: PKI Is Not Dead, Just Resting. IEEE Computer, Vol. 35, No. 8, pp. 41-49, New York, (2002)
-
(2002)
IEEE Computer
, vol.35
, Issue.8
, pp. 41-49
-
-
Gutman, P.1
-
159
-
-
11144221306
-
-
W3C NOTE-ws-gloss-20040211, Cambridge / Sophia Antipolis / Kanagawa
-
Haas H. Brown A. (editors): Web Services Glossary. W3C NOTE-ws-gloss-20040211, Cambridge / Sophia Antipolis / Kanagawa, (2004). http://www.w3.Org/TR/2004/NOTE-ws-gloss-20040211/#securitymechanism
-
(2004)
Web Services Glossary
-
-
Haas, H.1
Brown, A.2
-
160
-
-
0003048077
-
The s/key one-time password system
-
San Diego
-
Haller N.M.: The S/Key One-Time Password System. Proceedings of the ISOC SNDSS, pp. 151-157, San Diego, (1994)
-
(1994)
Proceedings of the ISOC SNDSS
, pp. 151-157
-
-
Haller, N.M.1
-
161
-
-
84892823231
-
EU Update: Baker & mckenzies regular article tracking developments in eu law relating to ip it & telecommunications
-
Elsevier
-
Halliday D. et al.: EU Update: Baker & McKenzies Regular Article Tracking Developments in EU Law Relating to IP, IT & Telecommunications. Computer Law & Security Report, Vol. 19, No. 2, pp. 61-64, Elsevier, (2003)
-
(2003)
Computer Law & Security Report
, vol.19
, Issue.2
, pp. 61-64
-
-
Halliday, D.1
-
162
-
-
0036329258
-
The open source approach - Opportunities and limitations with respect to security and privacy
-
Elsevier
-
Hansen M., Kohntopp K., Pfitzmann A.: The Open Source Approach - Opportunities and Limitations With Respect to Security and Privacy. Computers & Security, Vol. 21, No. 5, pp. 461-471, Elsevier, (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 461-471
-
-
Hansen, M.1
Kohntopp, K.2
Pfitzmann, A.3
-
164
-
-
2342576368
-
Does cc paradigm have a future?
-
IEEE
-
Hearn J.: Does CC Paradigm Have a Future? Security & Privacy, Vol. 2004, No. 1, pp. 64-65, IEEE, (2004)
-
(2004)
Ecurity & Privacy
, vol.2004
, Issue.1
, pp. 64-65
-
-
Hearn, J.1
-
166
-
-
0038443128
-
Privacy legislation - A comparison of the us and eu approaches
-
Elsevier
-
Hinde S.: Privacy Legislation - A Comparison of the US and EU Approaches. Computers & Security, Vol. 22, No. 5, pp. 378-387, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 378-387
-
-
Hinde, S.1
-
167
-
-
0037530622
-
Careless about privacy
-
Elsevier
-
Hinde S.: Careless About Privacy. Computers & Security, Vol. 22, No. 4, pp. 284-288, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 284-288
-
-
Hinde, S.1
-
171
-
-
85015743862
-
Brainstorming products for the long-term future
-
Blackwell Publishing, Oxford
-
Hollins B.: Brainstorming Products for the Long-term Future. Creativity and Innovation Management, Vol. 8, No. 4, pp. 286-293, Blackwell Publishing, Oxford, (1999)
-
(1999)
Creativity and Innovation Management
, vol.8
, Issue.4
, pp. 286-293
-
-
Hollins, B.1
-
175
-
-
0036495835
-
Quantum cryptography latest - Promises to boost security within a decade but won't end the arms race
-
Elsevier
-
Hunter P.: Quantum Cryptography Latest - Promises to Boost Security Within a Decade but Won't End the Arms Race. Computer Fraud & Security, Vol. 2002, No. 3, pp. 14-15, Elsevier, (2002)
-
(2002)
Computer Fraud & Security
, vol.2002
, Issue.3
, pp. 14-15
-
-
Hunter, P.1
-
176
-
-
0346707578
-
Access control with role attribute certificates
-
Elsevier
-
Hwang J., Wu K., Liu D.: Access Control With Role Attribute Certificates. Computer Standards & Interfaces, Vol. 22, No. 1, pp. 43-53, Elsevier, (2000)
-
(2000)
Computer Standards & Interfaces
, vol.22
, Issue.1
, pp. 43-53
-
-
Hwang, J.1
Wu, K.2
Liu, D.3
-
177
-
-
16644392725
-
Security defects in ccitt recommendation x.509
-
New York
-
I'Anson C, Mitchell C: Security Defects in CCITT Recommendation X.509. ACM SIGCOMM, Vol. 20, No. 2, pp. 30-40, New York, (1990)
-
(1990)
ACM SIGCOMM
, vol.20
, Issue.2
, pp. 30-40
-
-
I'Anson, C.1
Mitchell, C.2
-
178
-
-
1142264879
-
-
W3C REC-xmlenc-core-20021210 Cambridge / Sophia Antipolis / Kanagawa
-
Imamura T., Dillaway B., Simon E.: XML Encryption Syntax and Processing. W3C REC-xmlenc-core-20021210, Cambridge / Sophia Antipolis / Kanagawa, (2002), http://www.w3.org/TR/2002/REC-xmlenc-core-20021210/
-
(2002)
XML Encryption Syntax and Processing
-
-
Imamura, T.1
Dillaway, B.2
Simon, E.3
-
179
-
-
33644980178
-
-
International Labor Organization ILO Code of Practice, ILO, Geneva
-
International Labor Organization: Protection of Workers Personal Data. ILO Code of Practice, ILO, Geneva, (1997)
-
(1997)
Protection of Workers Personal Data
-
-
-
181
-
-
0003767375
-
Information processing systems - Open systems interconnection - Basic reference model
-
International Standards Organization, ISO 7498-2, Geneva
-
International Standards Organization: Information Processing Systems - Open Systems Interconnection - Basic Reference Model, Security Architecture, part 2. ISO 7498-2, Geneva, (1989)
-
(1989)
Security Architecture
, Issue.PART 2
-
-
-
186
-
-
84892783168
-
IT - Management of Information and Communications Technology Security
-
International Standards Organization ISO / IEC 13335-1, Geneva
-
International Standards Organization: IT - Management of Information and Communications Technology Security, Part 1: Concepts and Models for Information and Communications Technology Security Management. ISO / IEC 13335-1, Geneva, (2004)
-
(2004)
Concepts and Models for Information and Communications Technology Security Management
, Issue.PART 1
-
-
-
187
-
-
84892818317
-
IT - Guidelines for the Management of IT Security
-
International Standards Organization ISO / IEC TR 13335-2, Geneva
-
International Standards Organization: IT - Guidelines for the Management of IT Security, Part 2: Managing and Planning. ISO / IEC TR 13335-2, Geneva, (1997)
-
(1997)
Managing and Planning
, Issue.PART 2
-
-
-
188
-
-
84892790492
-
IT - Guidelines for the Management of IT Security
-
International Standards Organization ISO / IEC TR13335-3, Geneva
-
International Standards Organization: IT - Guidelines for the Management of IT Security, Part 3: Techniques for the Management of IT Security. ISO / IEC TR 13335-3, Geneva, (1998)
-
(1998)
Techniques for the Management of IT Security
, Issue.PART 3
-
-
-
189
-
-
84892781574
-
IT - Guidelines for the management of it security
-
International Standards Organization ISO / IEC TR 13335-4, Geneva
-
International Standards Organization: IT - Guidelines for the Management of IT Security, Part 4: Selection of Safeguards. ISO / IEC TR 13335-4, Geneva, (2000)
-
(2000)
Selection of Safeguards
, Issue.PART 4
-
-
-
190
-
-
84892784942
-
IT - Guidelines for the Management of IT Security
-
International Standards Organization ISO / IEC TR 13335-5, Geneva
-
International Standards Organization: IT - Guidelines for the Management of IT Security, Part 5: Management Guidance on Network Security. ISO / IEC TR 13335-5, Geneva, (2001)
-
(2001)
Management Guidance on Network Security
, Issue.PART 5
-
-
-
193
-
-
84892803348
-
IT - Security techniques - Hash-functions
-
International Standards Organization ISO 10118-3, Geneva
-
International Standards Organization: IT - Security techniques - Hash-functions - Part 3: Dedicated Hash Functions. ISO 10118-3, Geneva, (2003)
-
(2003)
Dedicated Hash Functions
, Issue.PART 3
-
-
-
196
-
-
84892801738
-
-
ISS Atlanta
-
Internet Security Systems: X-Force Web Archives. ISS, Atlanta, (2005), http://xforce.iss.net/
-
(2005)
X-Force Web Archives
-
-
-
197
-
-
84892816362
-
-
ITU-T: IT - Open Systems Interconnection - The Directory Recommendation X.500, Geneva
-
ITU-T: IT - Open Systems Interconnection - The Directory: Overview of Concepts, Models and Services. Recommendation X.500, Geneva, (1997)
-
(1997)
Overview of Concepts, Models and Services
-
-
-
198
-
-
84892793707
-
-
ITU-T: IT - Open Systems Interconnection - The Directory Geneva
-
ITU-T: IT - Open Systems Interconnection - The Directory - Public Key and Attribute Certificate Frameworks. X.509 v4, Geneva, (2000)
-
(2000)
Public Key and Attribute Certificate Frameworks
, vol.4
, pp. 509
-
-
-
199
-
-
1942537595
-
Could There Ever be a Unitary Digital Certificate?
-
Elsevier
-
Jaweed S.: Could There Ever be a Unitary Digital Certificate? Information Security Journal, Vol. 8, No. 3, pp. 36-44, Elsevier, (2003)
-
(2003)
Information Security Journal
, vol.8
, Issue.3
, pp. 36-44
-
-
Jaweed, S.1
-
201
-
-
0347608169
-
A logic for uncertain probabilities
-
World Scientific Publishing Company, New York
-
Josang A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 9, No. 3, pp. 279-311, World Scientific Publishing Company, New York, (2001)
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
202
-
-
0012497782
-
Elliptic curves and cryptography
-
CMP Media
-
Jurisic A., Menezes A.: Elliptic Curves and Cryptography. Dr. Dobb's Journal, Vol. 1997, No. 264, pp. 26-37, CMP Media, (1997)
-
(1997)
Dr Dobb's Journal
, vol.1997
, Issue.264
, pp. 26-37
-
-
Jurisic, A.1
Menezes, A.2
-
203
-
-
17444423290
-
Sociotechnical architecture for online privacy
-
IEEE
-
Jutla D.N., Bodorik P.: Sociotechnical Architecture for Online Privacy. Security & Privacy, Vol. 4, No. 2, pp. 29-39, IEEE, (2005)
-
(2005)
Security & Privacy
, vol.4
, Issue.2
, pp. 29-39
-
-
Jutla, D.N.1
Bodorik, P.2
-
206
-
-
1642394689
-
-
IBM, Cambridge / Sophia Antipolis / Kanagawa
-
Kaler C. (editor): Web Services Security (WS-Security), v 1.0. IBM, Cambridge / Sophia Antipolis / Kanagawa 2002, http://www-106.ibm.com/ developerworks/webservices/library/ws-secure
-
(2002)
Web Services Security (WS-Security), v 1.0
-
-
Kaler, C.1
-
208
-
-
84892784307
-
Smart-card and IP-based Infrastructure for a Health-care Information System in Slovenia
-
Internet Society, Yokohama
-
Kalin T., Kandus G., Trcek D., Novak R., Suselj M.: Smart-card and IP-based Infrastructure for a Health-care Information System in Slovenia. Proceedings of the INET 2000 - The internet global summit, Internet Society, Yokohama, (2000)
-
(2000)
Proceedings of the INET 2000 - The Internet Global Summit
-
-
Kalin, T.1
Kandus, G.2
Trcek, D.3
Novak, R.4
Suselj, M.5
-
211
-
-
0037002475
-
Intrusion Detection - A Brief History and Overview
-
IEEE
-
Kemmerer R.A., Vigna G.: Intrusion Detection - A Brief History and Overview. Security & Privacy, Vol. 35, No. 5, pp. 27-30, IEEE, (2002)
-
(2002)
Security & Privacy
, vol.35
, Issue.5
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
212
-
-
84892785989
-
Auditing - The Future of IT Security
-
Elsevier
-
Kemp G.: Auditing - The Future of IT Security. Computer Fraud & Security, Vol. 2001, No. 10, pp. 15-18, Elsevier, (2001)
-
(2001)
Computer Fraud & Security
, vol.2001
, Issue.10
, pp. 15-18
-
-
Kemp, G.1
-
214
-
-
0034427834
-
The byte stops here - Duty and liability for negligent internet security
-
IEEE
-
Kenneally E.: The Byte Stops Here - Duty and Liability for Negligent Internet Security. IEEE Computer Security Journal, Vol. 16, No. 4, pp. 1-26, IEEE, (2000) "
-
(2000)
IEEE Computer Security Journal
, vol.16
, Issue.4
, pp. 1-26
-
-
Kenneally, E.1
-
217
-
-
0003315821
-
IP encapsulating security payload (ESP)
-
Reston
-
Kent S., Atkinson R.: IP Encapsulating Security Payload (ESP). IETF RFC 2406, Reston, (1998)
-
(1998)
IETF RFC
, vol.2406
-
-
Kent, S.1
Atkinson, R.2
-
218
-
-
0141458139
-
Threats and solutions to web services security
-
Elsevier
-
King S.: Threats and Solutions to Web Services Security. Network Security, Vol. 2003, No. 9, pp. 8-12, Elsevier (2003)
-
(2003)
Network Security
, vol.2003
, Issue.9
, pp. 8-12
-
-
King, S.1
-
219
-
-
84939573910
-
Differential power analysis
-
Springer Verlag, Heidelberg
-
Kocher P.C., Jaffe J., Jun B.: Differential Power Analysis. Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes In Computer Science, Vol. 1666, pp. 388-397, Springer Verlag, Heidelberg, (1999)
-
(1999)
th Annual International Cryptology Conference on Advances in Cryptology Lecture Notes in Computer Science
, vol.1666
, pp. 388-397
-
-
Kocher, P.C.1
Jaffe, J.2
Jun, B.3
-
220
-
-
4243719783
-
-
Tilburg
-
Koops B. J.: Crypto Law Survey. Tilburg, (2004), http://rechten.uvt.nl/ koops/cryptolaw/
-
(2004)
Crypto Law Survey
-
-
Koops, B.J.1
-
225
-
-
0019634370
-
Password authentication with insecure communication
-
ACM
-
Lamport L.: Password Authentication with Insecure Communication. Communications of ACM, Vol. 24, No. 11, pp. 770-772, ACM, (1981)
-
(1981)
Communications of ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
226
-
-
17544394392
-
Computer security in the real world
-
IEEE
-
Lampson B.: Computer Security in the Real World. Computer, Vol. 37, No. 6, pp. 37-46, IEEE, (2004)
-
(2004)
Computer
, vol.37
, Issue.6
, pp. 37-46
-
-
Lampson, B.1
-
227
-
-
0042468088
-
Public key infrastructure - A micro and macro analysis
-
Elsevier
-
Lancaster S.: Public Key Infrastructure - A Micro and Macro Analysis. Computer Standards & Interfaces, Vol. 25. No. 5, pp. 437-446, Elsevier, (2003)
-
(2003)
Computer Standards & Interfaces
, vol.25
, Issue.5
, pp. 437-446
-
-
Lancaster, S.1
-
228
-
-
0028514027
-
A taxonomy of computer program security flaws
-
New York
-
Landwehr CE. et al.: A Taxonomy of Computer Program Security Flaws. ACM Computing Surveys, Vol. 26, No. 3, pp. 211-254, New York, (1994)
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
-
230
-
-
0345764837
-
Improving user security behavior
-
Elsevier
-
Leach J.: Improving User Security Behavior. Computers & Security, Vol. 22, No. 8, pp. 685-692, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.8
, pp. 685-692
-
-
Leach, J.1
-
231
-
-
33646046750
-
-
W3C REC-DOM-Level-3-Core-20040407, Cambridge / Sophia Antipolis / Kanagawa
-
Le Hors A., Le Hegaret P., Wood L., Nicol G., Robie J., Champion M., Byrne S. (editors): Document Object Model (DOM) Level 3 Core Specification v 1.0. W3C REC-DOM-Level-3-Core-20040407, Cambridge / Sophia Antipolis / Kanagawa, (2004), http://www.w3.org/TR/2004/REC-DOM-Level-3-Core- 20040407
-
(2004)
Document Object Model (DOM) Level 3 Core Specification v 1.0
-
-
Le Hors, A.1
Le Hegaret, P.2
Wood, L.3
Nicol, G.4
Robie, J.5
Champion, M.6
Byrne, S.7
-
232
-
-
84892829794
-
Micropayments - An idea whose time has passed twice?
-
Elsevier
-
Lesk M.: Micropayments - An Idea Whose Time Has Passed Twice? Computers & Security, Vol. 3, No. 1, pp. 61-63, Elsevier, (2004)
-
(2004)
Computers & Security
, vol.3
, Issue.1
, pp. 61-63
-
-
Lesk, M.1
-
233
-
-
0003891936
-
-
W3C REC-CSS1-19990111, Cambridge / Sophia Antipolis / Kanagawa
-
Lie H., Bos B.: Cascading Style Sheets, level 1. W3C REC-CSS1-19990111, Cambridge / Sophia Antipolis / Kanagawa, (1999), http://www.w3.org/TR/1999/REC- CSSl-19990111
-
(1999)
Cascading Style Sheets, Level 1
-
-
Lie, H.1
Bos, B.2
-
234
-
-
0035108586
-
A practical guide to biometrie security technology
-
IEEE
-
Liu S., Silverman M.: A Practical Guide to Biometrie Security Technology. IT Pro, Vol. 3, No. 1, pp. 27-32, IEEE, (2001)
-
(2001)
IT Pro
, vol.3
, Issue.1
, pp. 27-32
-
-
Liu, S.1
Silverman, M.2
-
235
-
-
0344034773
-
Security log management
-
Elsevier
-
Lobo C: Security Log Management. Network Security, Vol. 2003, No. 11, pp. 6-9, Elsevier, (2003)
-
(2003)
Network Security
, vol.2003
, Issue.11
, pp. 6-9
-
-
Lobo, C.1
-
237
-
-
84892792935
-
The algebraic specification language LOTOS
-
ACM
-
Logrippo L., Melanchuk T., Wors R.J.D.: The Algebraic Specification Language LOTOS. ACM SIGSOFT Software Engineering Notes, Vol. 15, No. 4, pp. 59-66, ACM, (1990)
-
(1990)
ACM SIGSOFT Software Engineering Notes
, vol.15
, Issue.4
, pp. 59-66
-
-
Logrippo, L.1
Melanchuk, T.2
Wors, R.J.D.3
-
238
-
-
8344266879
-
Authentication and Authorization Infrastructures - A Comparative Survey
-
Elsevier
-
Lopez J., Oppliger R., Pernul G.: Authentication and Authorization Infrastructures - A Comparative Survey. Computers & Security, Vol. 23, No. 7, pp. 578-590, Elsevier, (2004)
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
241
-
-
84979828719
-
Personal Privacy - Transatlantic Perspective
-
Elsevier
-
Manny H. C: Personal Privacy - Transatlantic Perspective. Computer Law & Security, Vol. 19, No. 1, pp. 4-10, Elsevier, (2003)
-
(2003)
Computer Law & Security
, vol.19
, Issue.1
, pp. 4-10
-
-
Manny, H.C.1
-
242
-
-
17844381888
-
Keyjacking - The surprising insecurity of client-side ssl
-
Elsevier
-
Marchesini J., Smith S.W., Zhao M.: Keyjacking - The Surprising Insecurity of Client-Side SSL. Computers & Security.Vol. 24, No. 2, pp. 109-123, Elsevier, (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 109-123
-
-
Marchesini, J.1
Smith, S.W.2
Zhao, M.3
-
243
-
-
84892805082
-
-
MasterCard Cardholder Solutions, Draft standards, parts 1 through 4, St. Louis
-
MasterCard Cardholder Solutions: Secure Electronic Payment Protocol. Draft standards, parts 1 through 4, St. Louis, (1995), http://www.x5.net/faqs/ crypto/ql40.html
-
(1995)
Secure Electronic Payment Protocol
-
-
-
245
-
-
0038519807
-
Dynamic corporate culture lies at the heart of effective security strategy
-
Elsevier
-
May C: Dynamic Corporate Culture Lies at the Heart of Effective Security Strategy. Computer Fraud & Security, Vol. 2003, No. 5, pp. 10-13, Elsevier, (2003)
-
(2003)
Computer Fraud & Security
, vol.2003
, Issue.5
, pp. 10-13
-
-
May, C.1
-
247
-
-
3242785761
-
Who is liable for insecure systems?
-
IEEE
-
Mead N. R.: Who Is Liable for Insecure Systems? IEEE Computer, Vol. 37, No. 7, pp. 27-34, IEEE, (2004)
-
(2004)
IEEE Computer
, vol.37
, Issue.7
, pp. 27-34
-
-
Mead, N.R.1
-
250
-
-
84979831163
-
Information privacy regulation: The eu model and the french model
-
Elsevier
-
Meunchinger E. N.: Information Privacy Regulation: The EU Model and the French Model. Computer Law & Security Report, Vol. 17, No. 6, pp. 390-394, Elsevier, (2001)
-
(2001)
Computer Law & Security Report
, vol.17
, Issue.6
, pp. 390-394
-
-
Meunchinger, E.N.1
-
252
-
-
84892817081
-
US to EU on Software Patents "we sold out, you should too"
-
Miller R.: US to EU on Software Patents: "We sold out, you should too". NewsForge, (2004), http://trends.newsforge.com/trends/04/06/09/.
-
(2004)
NewsForge
-
-
Miller, R.1
-
256
-
-
22444435942
-
Increasing the capacity of companies to absorb inventions from research organizations and encouraging people to innovate
-
Taylor and Francis
-
Mulej M., Likar B.: Increasing the Capacity of Companies to Absorb Inventions from Research Organizations and Encouraging People to Innovate. Cybernetics and Systems, Vol. 36, No. 5, pp. 491-512, Taylor and Francis, (2005)
-
(2005)
Cybernetics and Systems
, vol.36
, Issue.5
, pp. 491-512
-
-
Mulej, M.1
Likar, B.2
-
260
-
-
84892798781
-
-
National Infrastructure Security Co-ordination Centre NISCC Technical Note 10/04, rev. 2, London
-
National Infrastructure Security Co-ordination Centre: Understanding Firewalls. NISCC Technical Note 10/04, rev. 2, London, (2005)
-
(2005)
Understanding Firewalls
-
-
-
261
-
-
0003508564
-
-
National Institute of Standards and Technology FIPS 186, Washington D.C.
-
National Institute of Standards and Technology: Digital Signature Standard -DSS. FIPS 186, Washington D.C., (1994)
-
(1994)
Digital Signature Standard -DSS
-
-
-
262
-
-
0038562418
-
-
National Institute of Standards and Technology NIST Special Publication 800-12, Washington D.C.
-
National Institute of Standards and Technology: An Introduction to Computer Security. NIST Special Publication 800-12, Washington D.C., (1996)
-
(1996)
An Introduction to Computer Security
-
-
-
263
-
-
0003508568
-
-
National Institute of Standards and Technology, FIPS PUB 46-3, Washington D.C.
-
National Institute of Standards and Technology: Data Encryption Standard. FIPS PUB 46-3, Washington D.C., (1999)
-
(1999)
Data Encryption Standard
-
-
-
264
-
-
0003508558
-
-
National Institute of Standards and Technology FIPS PUB 197, Washington D.C
-
National Institute of Standards and Technology: Advanced Encryption Standard. FIPS PUB 197, Washington D.C., (2001)
-
(2001)
Advanced Encryption Standard
-
-
-
265
-
-
33746911297
-
-
National Institute of Standards and Technology FIPS PUB 180-2, Washingotn D.C
-
National Institute of Standards and Technology: Secure Hash Signature Standard. FIPS PUB 180-2, Washingotn D.C., (2002)
-
(2002)
Secure Hash Signature Standard
-
-
-
266
-
-
0013379958
-
-
National Institute of Standards and Technology / SEMATECH: NIST / SEMATECH, Gaithersburg / Austin
-
National Institute of Standards and Technology / SEMATECH: e-Handbook of Statistical Methods. NIST / SEMATECH, Gaithersburg / Austin, (2005), http://www.itl.nist.gov/div898/handbook/
-
(2005)
E-Handbook of Statistical Methods
-
-
-
267
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
ACM
-
Needham R.M., Schroeder M.D.: Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, Vol. 21, No. 12, pp. 993-999, ACM, (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
268
-
-
84892782217
-
-
Network World. Network World Inc., Southborough
-
Network World: Executive Guide to Wireless Security. Network World Inc., Southborough, (2005)
-
(2005)
Executive Guide to Wireless Security
-
-
-
269
-
-
0028514601
-
Kerberos - An authentication service for computer networks
-
IEEE
-
Neumann B.C., T'so T.: Kerberos - An Authentication Service for Computer Networks. IEEE Comm. Magazine, Vol. 32, No. 9, pp. 33-38, IEEE, (1994)
-
(1994)
IEEE Comm. Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neumann, B.C.1
T'So, T.2
-
270
-
-
84957660976
-
Cryptanalysis of the Ajtai-Dwork cryptosystem
-
Springer Verlag, Heidelberg
-
Nguyen P, Stern J.: Cryptanalysis of the Ajtai-Dwork Cryptosystem. Proceedings of Crypto '98, Lecture Notes in Computer Science, Vol. 1462, pp. 223-242, Springer Verlag, Heidelberg, (1998)
-
(1998)
Proceedings of Crypto '98 Lecture Notes in Computer Science
, vol.1462
, pp. 223-242
-
-
Nguyen, P.1
Stern, J.2
-
272
-
-
55849097497
-
Application to Application Web Services - Interactive Web Services
-
IT University of Copenhagen, Copenhagen
-
Niss H.: Application to Application Web Services - Interactive Web Services. Course materials, IT University of Copenhagen, Copenhagen, (2004), http://www.itu.dk/courses/IWSJ/E2004/slides/app2app.pdf
-
(2004)
Course Materials
-
-
Niss, H.1
-
274
-
-
0242372122
-
Side-channel attack on substitution blocks
-
Springer-Verlag, Heidelberg
-
Novak, R.: Side-Channel Attack on Substitution Blocks. Proceedings of the Int. Conference on Applied Cryptography and Network Security 2003, Lecture Notes in Computer Science, Vol. 2846, pp. 307-318, Springer-Verlag, Heidelberg, (2003)
-
(2003)
Proceedings of the Int. Conference on Applied Cryptography and Network Security 2003, Lecture Notes in Computer Science
, vol.2846
, pp. 307-318
-
-
Novak, R.1
-
275
-
-
84892824175
-
Unified modeling language
-
Object Management Group OMG, Needham
-
Object Management Group: Unified Modeling Language. OMG Specification v 1.5, OMG, Needham, (2003)
-
(2003)
OMG Specification v 1.5
-
-
-
276
-
-
35248829217
-
The case against micropayments
-
Springer Verlag, Heidelberg
-
Odlyzko A.M.: The Case Against Micropayments. Proceedings of Financial Cryptography 03, Lecture Notes on Computer Science, No. 2742, pp. 77-83, Springer Verlag, Heidelberg, (2003)
-
(2003)
Proceedings of Financial Cryptography 03 Lecture Notes on Computer Science
, Issue.2742
, pp. 77-83
-
-
Odlyzko, A.M.1
-
277
-
-
0005456577
-
-
Organization for Economic Co-operation and Development. OECD, Paris
-
Organization for Economic Co-operation and Development: Guidelines for Cryptography Policy. OECD, Paris, (1997)
-
(1997)
Guidelines for Cryptography Policy
-
-
-
278
-
-
84892815686
-
Implementing the OECD "privacy guidelines"
-
Organization for Economic Co-operation and Development Focus On The Internet. DSTI/ICCP/REG(97)6/FINAL, OECD, Paris
-
Organization for Economic Co-operation and Development: Implementing The OECD "Privacy Guidelines" In The Electronic Environment: Focus On The Internet. DSTI/ICCP/REG(97)6/FINAL, OECD, Paris, (1998)
-
(1998)
The Electronic Environment
-
-
-
280
-
-
1942441439
-
PKI Needs good standards?
-
Elsevier
-
Palmer T.: PKI Needs Good Standards? Information Security Technical Report, Vol. 8, No. 3, pp. 6-13, Elsevier, (2003)
-
(2003)
Information Security Technical Report
, vol.8
, Issue.3
, pp. 6-13
-
-
Palmer, T.1
-
281
-
-
0035396467
-
P2P networking - An information sharing alternative
-
IEEE
-
Parameswaran M., et al.: P2P Networking - An Information Sharing Alternative. IEEE Computer, Vol. 34, No. 7, pp. 31-37, IEEE, (2001)
-
(2001)
IEEE Computer
, vol.34
, Issue.7
, pp. 31-37
-
-
Parameswaran, M.1
-
283
-
-
0142216143
-
Balancing the security budget
-
Elsevier
-
Pemble M.: Balancing the Security Budget. Computer Fraud & Security, Vol. 3, No. 10, pp. 8-11, Elsevier, (2003)
-
(2003)
Computer Fraud & Security
, vol.3
, Issue.10
, pp. 8-11
-
-
Pemble, M.1
-
284
-
-
0003724905
-
Information systems security: Scope, state-of-the-art and evaluation of techniques
-
Elsevier
-
Pernul G.: Information Systems Security: Scope, State-of-the-art and Evaluation of Techniques. International Journal of Information Management, Vol. 15. No. 3, pp. 242-256, Elsevier, (1995)
-
(1995)
International Journal of Information Management
, vol.15
, Issue.3
, pp. 242-256
-
-
Pernul, G.1
-
285
-
-
1542335487
-
Non-pki methods for public key distribution
-
Elsevier
-
Peyravian M., Roginsky A., Zunic N.: Non-PKI Methods for Public Key Distribution. Computers & Security, Vol. 2004, No. 23, pp. 97-103, Elsevier, (2004)
-
(2004)
Computers & Security
, vol.2004
, Issue.23
, pp. 97-103
-
-
Peyravian, M.1
Roginsky, A.2
Zunic, N.3
-
288
-
-
0037282522
-
Some trends in research in cryptography and security mechanisms
-
Elsevier
-
Piper F.: Some Trends in Research in Cryptography and Security Mechanisms. Computers & Security, Vol. 22, No. 1, pp. 22-25, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 22-25
-
-
Piper, F.1
-
295
-
-
0142043280
-
Wireless Security policies
-
Elsevier
-
Potter B.: Wireless Security policies. Network Security, Vol. 2003, No. 10, pp. 10-12, Elsevier, (2003)
-
(2003)
Network Security
, vol.2003
, Issue.10
, pp. 10-12
-
-
Potter, B.1
-
296
-
-
0036299702
-
The emergence of a comprehensive obligation towards computer security
-
Elsevier
-
Pounder C: The Emergence of a Comprehensive Obligation Towards Computer Security. Computers & Security, Vol. 21., No. 4., pp. 328-332, Elsevier, (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 328-332
-
-
Pounder, C.1
-
299
-
-
84892827704
-
Preface to the special issue on security in global computing
-
Springer Verlag
-
Priami C: Preface to the Special Issue on Security in Global Computing. International Journal on Information Security, Vol. 2, No. 3-4, p. 125, Springer Verlag, (2004)
-
(2004)
International Journal on Information Security
, vol.2
, Issue.3-4
, pp. 125
-
-
Priami, C.1
-
300
-
-
0003367568
-
S/MIME version 3 message specification
-
Reston
-
Ramsdell B. (editor): S/MIME Version 3 Message Specification. IETF RFC 2633, Reston, (1999)
-
(1999)
IETF RFC
, vol.2633
-
-
Ramsdell, B.1
-
302
-
-
0037265822
-
Wireless lan security - Things you should know about wlan security
-
Elsevier
-
Regan K.: Wireless LAN Security - Things You Should Know About WLAN Security. Network Security, Vol. 03, No. 1, pp. 7-9, Elsevier, (2003)
-
(2003)
Network Security
, vol.3
, Issue.1
, pp. 7-9
-
-
Regan, K.1
-
303
-
-
0034955243
-
Extending the risk analysis model to include market-insurance
-
Elsevier
-
Reid C.R., Floyd S.A.: Extending the Risk Analysis Model to Include Market-Insurance. Computers & Security, Vol. 20, No. 4, pp. 331-339, Elsevier, (2001)
-
(2001)
Computers & Security
, vol.20
, Issue.4
, pp. 331-339
-
-
Reid, C.R.1
Floyd, S.A.2
-
304
-
-
84892794675
-
A Honeynet within the german network - Experiences and results
-
Springer Verlag, Heidelberg
-
Reiser H., Volker G.: A Honeynet within the German Network - Experiences and Results. Lecture Notes in Informatics, Vol. 46, pp. 113-128, Springer Verlag, Heidelberg, (2004)
-
(2004)
Lecture Notes in Informatics
, vol.46
, pp. 113-128
-
-
Reiser, H.1
Volker, G.2
-
305
-
-
0017930809
-
A Method for obtaining digital signatures and public-key cryptosystems
-
ACM
-
Rivest R.L., Shamir A., Adleman L.M.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21, No. 2, pp. 120-126, ACM, (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
307
-
-
84979076059
-
Payword and micromint - Two simple micropayment schemes
-
Springer Verlag, Heidelberg
-
Rivest R., Shamir A.: PayWord and MicroMint - Two Simple Micropayment Schemes. Lecture Notes In Computer Science, Vol. 1189, pp. 69-87, Springer Verlag, Heidelberg, (1996)
-
(1996)
Lecture Notes in Computer Science
, vol.1189
, pp. 69-87
-
-
Rivest, R.1
Shamir, A.2
-
308
-
-
0038564853
-
The case against regulating encryption technology
-
New York
-
Rivest R.: The Case Against Regulating Encryption Technology. Scientific American, Vol. 10, No. 10, pp. 88-89, New York, (1998)
-
(1998)
Scientific American
, vol.10
, Issue.10
, pp. 88-89
-
-
Rivest, R.1
-
309
-
-
84958042111
-
Can we eliminate revocation lists?
-
Proceedings of Financial Cryptography 98, Springer Verlag, Heidelberg
-
Rivest R.L.: Can We Eliminate Revocation Lists? Proceedings of Financial Cryptography 98, Lecture Notes in Computer Science, Vol. 1465, pp. 178-183, Springer Verlag, Heidelberg, (1998)
-
(1998)
Lecture Notes in Computer Science
, vol.1465
, pp. 178-183
-
-
Rivest, R.L.1
-
310
-
-
84892818400
-
CA requirements
-
2.5 document. Cambridge
-
Roe M.: CA Requirements. PASSWORD Project R. 2.5 document. Cambridge, (1993)
-
(1993)
PASSWORD Project R
-
-
Roe, M.1
-
313
-
-
85030463467
-
A formal approach to security architectures
-
Brighton
-
Rüppel R.A.: A Formal Approach to Security Architectures. Proceedings of Eurocrypt 91, pp. 387-398, Brighton, (1991)
-
(1991)
Proceedings of Eurocrypt 91
, pp. 387-398
-
-
Rüppel, R.A.1
-
316
-
-
84979819366
-
New copyright regulations make their debut
-
Elsevier
-
Saxby S.: New Copyright Regulations Make Their Debut. Computer Law & Security Report, Vol. 19, No. 2, p. 443, Elsevier, (2003)
-
(2003)
Computer Law & Security Report
, vol.19
, Issue.2
, pp. 443
-
-
Saxby, S.1
-
317
-
-
84979823965
-
EU Gets tough on intellectual property piracy
-
Elsevier
-
Saxby S.: EU Gets Tough on Intellectual Property Piracy. Computer Law & Security, Vol. 20, No. 3, p. 163, Elsevier, (2004)
-
(2004)
Computer Law & Security
, vol.20
, Issue.3
, pp. 163
-
-
Saxby, S.1
-
318
-
-
84953635000
-
Description of a New Variable-Length Key, 64-Bit Block Cipher
-
Springer Verlag, Heidelberg
-
Schneier B.: Description of a New Variable-Length Key, 64-Bit Block Cipher. Proceedings of Fast Software Encryption '93, pp. 191-204, Springer Verlag, Heidelberg, (1994)
-
(1994)
Proceedings of Fast Software Encryption '93
, pp. 191-204
-
-
Schneier, B.1
-
321
-
-
84892830089
-
Regulating cryptography
-
Counterpane Inc., Mountain View
-
Schneier B.: Regulating Cryptography. Crypto-Gram Newsletter, Vol. 4, No. 09/01, p. ?, Counterpane Inc., Mountain View, (2001), http://www.schneier.eom/ crypto-gram-0109a.html#5
-
(2001)
Crypto-Gram Newsletter
, vol.4
, Issue.1-9
-
-
Schneier, B.1
-
322
-
-
1942468085
-
Hacking the business climate for network security
-
IEEE
-
Schneier B.: Hacking the Business Climate for Network Security. Computer, Vol. 37, No. 4, pp. 87-89, IEEE, (2004)
-
(2004)
Computer
, vol.37
, Issue.4
, pp. 87-89
-
-
Schneier, B.1
-
323
-
-
84892818234
-
SHA-1 broken
-
Counterpane Internet Security, Mountain View
-
Schneier B.: SHA-1 Broken. Crypto-gram Newsletter, Vol. 8, No. 03/05, p. ?, Counterpane Internet Security, Mountain View, (2005), http://www.schneier. eom/crypto-gram-0503.html#l
-
(2005)
Crypto-gram Newsletter
, vol.8
, Issue.3-5
-
-
Schneier, B.1
-
324
-
-
0242314806
-
Security views
-
Elsevier
-
Schultz E.: Security views. Computers & Security, Vol. 21, No. 4, pp. 293-302, Elsevier, (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 293-302
-
-
Schultz, E.1
-
325
-
-
0036928883
-
The gap between cryptography and information security
-
Elsevier
-
Schultz E.: The Gap Between Cryptography and Information Security. Computers & Security, Vol. 21, No. 8, pp. 674-676, Elsevier, (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 674-676
-
-
Schultz, E.1
-
326
-
-
0242314806
-
Security views
-
Elsevier
-
Schultz E.: Security Views. Computers & Security, Vol. 21, No. 8, pp. 677-688, Elsevier, (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 677-688
-
-
Schultz, E.1
-
327
-
-
0142007153
-
Security views
-
Elsevier
-
Schultz E.: Security Views. Computers & Security, Vol. 22, No. 7, pp. 559-569, Elsevier, (2003)
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 559-569
-
-
Schultz, E.1
-
329
-
-
84892801321
-
-
Symantec corporation, Cupertino
-
Security Focus: Bugtraq Archives. Symantec corporation, Cupertino, (2005), http://www.securityfocus.com/
-
(2005)
Security Focus: Bugtraq Archives
-
-
-
330
-
-
84856043672
-
A mathematical theory of communication
-
623-656
-
Shannon CE.: A Mathematical Theory of Communication. Bell Systems Technical Journal, Vol. 27, No. ? / No. ?, pp. 379-423 / pp. 623-656, ?, (1948)
-
(1948)
Bell Systems Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
331
-
-
84979799710
-
Employee monitoring
-
Elsevier
-
Sharpe A., Rüssel C: Employee Monitoring. Computer Law & Security, Vol. 19, No. 5, pp. 411-415, Elsevier, (2003)
-
(2003)
Computer Law & Security
, vol.19
, Issue.5
, pp. 411-415
-
-
Sharpe, A.1
Rüssel, C.2
-
333
-
-
0001873077
-
A fast Monte-Carlo test for primality
-
Philadelphia
-
Solovay R., Strassen V.: A Fast Monte-Carlo Test for Primality. SIAM Journal on Computing, Vol. 1977, No. 6, pp. 84-85, Philadelphia, (1977)
-
(1977)
SIAM Journal on Computing
, vol.1977
, Issue.6
, pp. 84-85
-
-
Solovay, R.1
Strassen, V.2
-
335
-
-
0003213193
-
IP Network Address Translator (NAT) terminology and considerations
-
Reston
-
Srisuresh P., Holdrege M.: IP Network Address Translator (NAT) Terminology and Considerations. IETF RFC 2663, Reston, (1999)
-
(1999)
IETF RFC
, vol.2663
-
-
Srisuresh, P.1
Holdrege, M.2
-
337
-
-
0036568021
-
Data privacy approaches from US and EU perspectives
-
Elsevier
-
Steinke G.: Data Privacy Approaches From US and EU Perspectives. Telematics and Informatics, Vol. 19, No. 2, pp. 193-200, Elsevier, (2000)
-
(2000)
Telematics and Informatics
, vol.19
, Issue.2
, pp. 193-200
-
-
Steinke, G.1
-
338
-
-
0344740897
-
Applying forensic techniques to information system risk management
-
Elsevier
-
Stephenson P.: Applying Forensic Techniques to Information System Risk Management. Computer Fraud & Security, Vol. 2003, No. 12, pp. 17-19, Elsevier, (2003)
-
(2003)
Computer Fraud & Security
, vol.2003
, Issue.12
, pp. 17-19
-
-
Stephenson, P.1
-
340
-
-
0142042965
-
Spam & sobig - Arm in arm
-
Elsevier
-
Stewart J.: Spam & Sobig - Arm in Arm. Network Security, Vol. 3, No. 10. pp. 12-16, Elsevier, (2003)
-
(2003)
Network Security
, vol.3
, Issue.10
, pp. 12-16
-
-
Stewart, J.1
-
345
-
-
84863901332
-
Standards for information technology - Telecommunications and information exchange between systems - Local and metropolitan area network - Specific requirements - Part 11
-
IEEE 802.11, Piscataway
-
The Institute of Electrical and Electronics Engineers: Standards for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements - Part 11 / Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE 802.11, Piscataway, (1999), http://grouper.ieee.org/groups/ 802/ll/main.html
-
(1999)
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
-
-
347
-
-
0035661914
-
Cryptography regulations for e-commerce and digital rights management
-
Elsevier
-
Torrubia A. et al.: Cryptography Regulations for E-commerce and Digital Rights Management. Computers & Security, Vol. 20, No. 8, pp. 724-738, Elsevier, (2010)
-
(2010)
Computers & Security
, vol.20
, Issue.8
, pp. 724-738
-
-
Torrubia, A.1
-
348
-
-
30244488333
-
Organization of certification authorities in a global network
-
Computer Security Institute
-
Trcek D.: Organization of Certification Authorities in a Global Network. Computer Security Journal, Vol. 10, No. 1. pp. 71-81, Computer Security Institute, (1994)
-
(1994)
Computer Security Journal
, vol.10
, Issue.1
, pp. 71-81
-
-
Trcek, D.1
-
349
-
-
84889307241
-
CA-browsing system - A supporting application for global security services
-
San Diego
-
Trcek D., Klobucar T., Jerman B.B., Bracun F.: CA-Browsing System - A Supporting Application for Global Security Services. IEEE Proceedings of the ISOC Symposium on Network and Distributed System Security, pp. 123-128, San Diego, (1994)
-
(1994)
IEEE Proceedings of the ISOC Symposium on Network and Distributed System Security
, pp. 123-128
-
-
Trcek, D.1
Klobucar, T.2
Jerman, B.B.3
Bracun, F.4
-
350
-
-
0029492040
-
Formal language for security services base modeling and analysis
-
Elsevier
-
Trcek D., Jerman B.B.: Formal Language for Security Services Base Modeling and Analysis. Computer Communications, Vol. 18, No. 12, pp. 921-928, Elsevier, (1995)
-
(1995)
Computer Communications
, vol.18
, Issue.12
, pp. 921-928
-
-
Trcek, D.1
Jerman, B.B.2
-
351
-
-
0031146460
-
Certification authorities in a global network - Procedures and guidelines for a PKI
-
Sydney
-
Trcek D., Jerman B.B.: Certification Authorities in a Global Network - Procedures and Guidelines for a PKI. Australian Computer Journal, Vol. 29, No. 2, pp. 41-47, Sydney, (1997)
-
(1997)
Australian Computer Journal
, vol.29
, Issue.2
, pp. 41-47
-
-
Trcek, D.1
Jerman, B.B.2
-
352
-
-
0346337210
-
Minimizing the risk of electronic document forgery
-
Elsevier
-
Trcek D.: Minimizing the Risk of Electronic Document Forgery. Computer Standards & Interfaces, Vol. 19, No. 2, pp. 161-167, Elsevier, (1998)
-
(1998)
Computer Standards & Interfaces
, vol.19
, Issue.2
, pp. 161-167
-
-
Trcek, D.1
-
353
-
-
0035118271
-
Slovene smart-card and IP based health-care information system infrastructure
-
Elsevier
-
Trcek D., Novak R., Kandus G., Suselj M.: Slovene Smart-card and IP Based Health-care Information System Infrastructure. International Journal of Medical Informatics, Vol. 61. No. 1, pp. 33-43, Elsevier, (2001)
-
(2001)
International Journal of Medical Informatics
, vol.61
, Issue.1
, pp. 33-43
-
-
Trcek, D.1
Novak, R.2
Kandus, G.3
Suselj, M.4
-
354
-
-
3342911569
-
Towards trust management standardization
-
Elsevier
-
Trcek D.: Towards Trust Management Standardization. Computer Standards and Interfaces, Vol. 26, No. 6, pp. 543-548, Elsevier, (2004)
-
(2004)
Computer Standards and Interfaces
, vol.26
, Issue.6
, pp. 543-548
-
-
Trcek, D.1
-
356
-
-
84892792234
-
Business dynamics supported security policy management
-
John Wiley & Sons, Oxford
-
Trcek D.: Business Dynamics Supported Security Policy Management. Proceedings of the 22nd Conference of the SDS, John Wiley & Sons, Oxford, (2004)
-
(2004)
nd Conference of the SDS
-
-
Trcek, D.1
-
358
-
-
84892823606
-
-
UK Government
-
UK Government: UK Government Gateway. UK Government, (2005), http://www.gateway.gov.uk/
-
(2005)
UK Government Gateway
-
-
-
359
-
-
0038365269
-
-
UNCITRAL, Vienna
-
UN Commission on International Trade Law - UNCITRAL: Model Law on Electronic Commerce. UNCITRAL, Vienna, (1996) http://www.uncitral.org/english/ texts/elect-com/ecommerceindex.htm
-
(1996)
Model Law on Electronic Commerce
-
-
-
360
-
-
4243838611
-
-
UNCITRAL, Vienna
-
UN Commission on International Trade Law: Model Law on Digital Signatures. UNCITRAL, Vienna, (2001) http://www.uncitral.org/english/texts/ elect-com/ecommerceindex.htm
-
(2001)
Model Law on Digital Signatures
-
-
-
361
-
-
2942562850
-
Formal support for certificate management policies
-
Elsevier
-
Ungureanu V.: Formal Support for Certificate Management Policies. Computers & Security, Vol. 23, No. 4, pp. 300-311, Elsevier, (2004)
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 300-311
-
-
Ungureanu, V.1
-
362
-
-
0003969633
-
-
US Department of Defense, DoD, standard CSC-STD-001-83, Washington D.cJ
-
US Department of Defense: Trusted Computer System Evaluation Criteria. DoD, standard CSC-STD-001-83, Washington D.cJ (1983)
-
(1983)
Trusted Computer System Evaluation Criteria
-
-
-
364
-
-
84892830837
-
-
Washington D.C.
-
US Government: e-Authentication Gateway, Washington D.C., (2005), http://www.cio.gov/eauthentication/
-
(2005)
E-Authentication Gateway
-
-
-
365
-
-
0003453680
-
-
US Senate / House of Representatives. US Senate / House of Representatives, Washington D.C.
-
US Senate / House of Representatives: Digital Millennium Copyright Act - DMCA. US Senate / House of Representatives, Washington D.C., (1998) http://www.copyright.gov/legislation/dmca.pdf
-
(1998)
Digital Millennium Copyright Act - DMCA
-
-
-
369
-
-
84892829526
-
Digital dough fails to rise
-
South-borough
-
Weinberg N.: Digital Dough Fails to Rise. Network World, 04/12/99, South-borough, (1999), http://www.nwfusion.com/news/1999/0412dough.html
-
(1999)
Network World, 04/12/99
-
-
Weinberg, N.1
-
370
-
-
0346910300
-
"Top-down" versus "bottom-up" - Different approaches to security
-
Elsevier
-
Wilson P.: "Top-down" versus "Bottom-up" - Different Approaches to Security. Network Security, Vol. 2003, No. 12, pp. 17-19, Elsevier, (2003)
-
(2003)
Network Security
, vol.2003
, Issue.12
, pp. 17-19
-
-
Wilson, P.1
-
371
-
-
0037328442
-
Biometrie system security - Part 1
-
Elsevier
-
Wirtz B.: Biometrie System Security - part 1. Biometrie Technology Today, Vol. 11, No. 2, pp. 6-8, Elsevier, (2003)
-
(2003)
Biometrie Technology Today
, vol.11
, Issue.2
, pp. 6-8
-
-
Wirtz, B.1
-
372
-
-
0037349457
-
Biometrie system security - Part 2
-
Elsevier
-
Wirtz B.: Biometrie System Security - part 2. Biometrie Technology Today, Vol. 11, No. 3, pp. 8-9, Elsevier, (2003)
-
(2003)
Biometrie Technology Today
, vol.11
, Issue.3
, pp. 8-9
-
-
Wirtz, B.1
-
373
-
-
1942505732
-
Management strategies for implementing forensic security measures
-
Elsevier
-
Wolfe-Wilson J., Wolfe B.H.: Management Strategies for Implementing Forensic Security Measures. Information Security Technical Report, Vol. 8, No. 2, pp. 55-64, Elsevier, (2003)
-
(2003)
Information Security Technical Report
, vol.8
, Issue.2
, pp. 55-64
-
-
Wolfe-Wilson, J.1
Wolfe, B.H.2
-
375
-
-
84892816916
-
Simple object access protocol
-
Cambridge / Sophia Antipolis / Kanagawa
-
World Wide Web Consortium: Simple Object Access Protocol. W3C Recommendations TR 20030624, Parts 0, 1 and 2, Cambridge / Sophia Antipolis / Kanagawa, (2003), http://www.w3.org/TR/soap/
-
(2003)
W3C Recommendations TR 20030624, Parts 0, 1 and 2
-
-
-
376
-
-
84892794941
-
ZTC - A type checker for Z notation
-
Chicago
-
Xiaoping J.: ZTC - A Type Checker for Z Notation. User's Guide, Chicago, (1998)
-
(1998)
User's Guide
-
-
Xiaoping, J.1
-
377
-
-
85011105685
-
A proposal for a new block encryption standard
-
Springer Verlag, Heidelberg
-
Xuejia L, Massey J.L.: A Proposal for a New Block Encryption Standard. EUROCRYPT '90, pp. 389-404, Springer Verlag, Heidelberg, (1991)
-
(1991)
EUROCRYPT '90
, pp. 389-404
-
-
Xuejia, L.1
Massey, J.L.2
-
378
-
-
0043027916
-
Overcoming PKI obstacles
-
January 4, CNET Networks Inc.
-
Young K.: Overcoming PKI Obstacles. eWeek, January 4, CNET Networks Inc., (2001), http://www.zdnet.com/
-
(2001)
EWeek
-
-
Young, K.1
|