-
1
-
-
49049100147
-
Mitre technical report 2547 (secure computer system)
-
Bell, D., & Padula, L. L. (1996). Mitre technical report 2547 (secure computer system). Journal of Computer Security, 4(2), 239-263.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2
, pp. 239-263
-
-
Bell, D.1
Padula, L.L.2
-
2
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802.11
-
Rome, Italy. New York: ACM Press. Retrieved August 1, 2003, from
-
Borisov, N., Goldberg, I., & Wagner, D. (2001). Intercepting mobile communications: The insecurity of 802.11. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (pp. 180-189), Rome, Italy. New York: ACM Press. Retrieved August 1, 2003, from citeseer.ist.psu.edu/borisov01intercepting.html
-
(2001)
Proceedings of the 7th Annual International Conference On Mobile Computing and Networking
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
3
-
-
33646693777
-
-
Retrieved August 1, 2003, from
-
Daid, M. (2000). Bluetooth security, parts 1, 2, and 3. Retrieved August 1, 2003, from http://www.palowireless.com/bluearticle/cc1_security1.asp and http://www.palowireless. com/bluearticle/cc1_security2.asp http://www.palowireless.com/bluearticle/cc1_security3.asp
-
(2000)
Bluetooth Security, Parts 1, 2, and 3
-
-
Daid, M.1
-
4
-
-
0017018484
-
New directions in cryptography
-
IT
-
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions Information Theory, IT22(6), 644-654.
-
(1976)
IEEE Transactions Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
6
-
-
0027697301
-
The trustworthy digital camera: Restoring credibility to the photographic image
-
Friedman, G. (1993). The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions Consumer Electronics, 39(4), 905-910.
-
(1993)
IEEE Transactions Consumer Electronics
, vol.39
, Issue.4
, pp. 905-910
-
-
Friedman, G.1
-
7
-
-
0002544658
-
Software security and privacy risks in mobile e-commerce
-
Ghosh, K., & Swaminatha, T. (2001). Software security and privacy risks in mobile e-commerce. Communications of the ACM, 44(2), 51-57.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 51-57
-
-
Ghosh, K.1
Swaminatha, T.2
-
8
-
-
0004256091
-
-
West Sussex, UK, John Wiley & Sons
-
Gollmann, D. (1999). Computer security. West Sussex, UK: John Wiley & Sons.
-
(1999)
Computer Security
-
-
Gollmann, D.1
-
9
-
-
84898154298
-
-
(Tech. Rep. No. Scch-tr-0171). Hagenberg, Austria, Software Competence Center Hagenberg
-
Gruber, F., & Wolfmaier, K. (2001). State of the art in wireless communication (Tech. Rep. No. Scch-tr-0171). Hagenberg, Austria: Software Competence Center Hagenberg.
-
(2001)
State of the Art In Wireless Communication
-
-
Gruber, F.1
Wolfmaier, K.2
-
11
-
-
0031996445
-
Steganography: Seeing the unseen
-
Johnson, F., & Jajodia, S. (1998). Steganography: Seeing the unseen. IEEE Computer, 31(2), 26-34.
-
(1998)
IEEE Computer
, vol.31
, Issue.2
, pp. 26-34
-
-
Johnson, F.1
Jajodia, S.2
-
13
-
-
0003509908
-
-
(Tech. Rep. No. jtc1/sc29/wg11 n3536). International Organisation for Standardization ISO/IEC JTC1/SC29/WG11, Dpt. Of Computer Science and Engineering
-
Koenen, R. (2000). Overview of the mpeg-4 standard (Tech. Rep. No. jtc1/sc29/wg11 n3536). International Organisation for Standardization ISO/IEC JTC1/SC29/WG11, Dpt. Of Computer Science and Engineering.
-
(2000)
Overview of the Mpeg-4 Standard
-
-
Koenen, R.1
-
14
-
-
1342306801
-
Watermark-based copyright protection system security
-
Retrieved from
-
Kwok, S. H. (2003). Watermark-based copyright protection system security. Communications of the ACM, 46(10), 98-101. Retrieved from http://doi.acm.org/10.1145/944217.944219
-
(2003)
Communications of the ACM
, vol.46
, Issue.10
, pp. 98-101
-
-
Kwok, S.H.1
-
15
-
-
33646681378
-
-
Sans Institute. Retrieved August 1, 2003, from
-
Mahan, R. E. (2001). Security in wireless networks. Sans Institute. Retrieved August 1, 2003, from http://rr.sans.org/wireless/wireless_net3.php
-
(2001)
Security In Wireless Networks
-
-
Mahan, R.E.1
-
16
-
-
84947943261
-
Protecting digital media content
-
Memon, N., & Wong, P. W. (1998). Protecting digital media content. Communications of the ACM, 41(7), 35-43.
-
(1998)
Communications of the ACM
, vol.41
, Issue.7
, pp. 35-43
-
-
Memon, N.1
Wong, P.W.2
-
17
-
-
0141878942
-
-
NIS, (NSTISSI No. 4009 4009). NIS, Computer Science Department, Fanstord, California. Federal Standard 1037C
-
NIS. (1992). National information systems security (infosec) glossary (NSTISSI No. 4009 4009). NIS, Computer Science Department, Fanstord, California. Federal Standard 1037C.
-
(1992)
National Information Systems Security (infosec) Glossary
-
-
-
18
-
-
0039187866
-
-
(Tech. Rep. No. 122 122). Gothenburg, Sweden: Chalmers University of Technology, Department of Computer Engineering. Retrieved from
-
Olovsson, T. (1992). A structured approach to computer security (Tech. Rep. No. 122 122). Gothenburg, Sweden: Chalmers University of Technology, Department of Computer Engineering. Retrieved from http://www.securityfocus.com/library/661
-
(1992)
A Structured Approach to Computer Security
-
-
Olovsson, T.1
-
19
-
-
0010385996
-
-
Technical report, Helsinki University of Technology, Dpt. Of Computer Science and Engineering
-
Pesonen, L. (1999). Gsm interception. Technical report, Helsinki University of Technology, Dpt. Of Computer Science and Engineering.
-
(1999)
Gsm Interception
-
-
Pesonen, L.1
-
20
-
-
0000052619
-
Authentication, access control, and audit
-
Samarati, R. S. R. P. (1996). Authentication, access control, and audit. ACM Computing Surveys, 28(1), 241-243.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
, pp. 241-243
-
-
Samarati, R.S.R.P.1
-
21
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., & Coyne, E. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
-
23
-
-
4244031545
-
-
Retrieved August 1, 2003, from
-
Vainio, J. (2000). Bluetooth security. Retrieved August 1, 2003, from http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
-
(2000)
Bluetooth Security
-
-
Vainio, J.1
-
24
-
-
0003706975
-
-
Walke, volume 1. B. G. Teubner Verlag, Stuttgart
-
Walke. (2000). Mobilfunknetze und ihre Protokolle, volume 1. B. G. Teubner Verlag, Stuttgart.
-
(2000)
Mobilfunknetze Und Ihre Protokolle
-
-
|