-
2
-
-
34248389888
-
-
PhD thesis CMU-CS-94-149, Carnegie Mellon University
-
Bennet S. Yee. Using Secure Coprocessors. PhD thesis CMU-CS-94-149, Carnegie Mellon University, 1994.
-
(1994)
Yee. Using Secure Coprocessors
-
-
Bennet, S.1
-
3
-
-
84904260222
-
Performance Comparison of Java Cards for Micropayment Implementation
-
Kluwer Academic Publishers
-
Castellá-Roca, J.; Domingo-Ferrer, J.; Herrera-Joancomarti, J.; Planes, J. A Performance Comparison of Java Cards for Micropayment Implementation. Proceedings of CARDIS'2000, pp 19-38. Kluwer Academic Publishers. 2000.
-
(2000)
Proceedings of CARDIS'2000
, pp. 19-38
-
-
Castellá-Roca, J.1
Domingo-Ferrer, J.2
Herrera-Joancomarti, J.3
Planes, J.A.4
-
4
-
-
84904262564
-
-
4th CaberNet Radicals Workshop
-
Constantas, D. et al. An Architecture for Electronic Document Commerce. 4th CaberNet Radicals Workshop, 1997. Available online at http://www.newcastle.research.ec.org/cabernet/research/radicals/1997/papers/edc-constanta.html
-
(1997)
An Architecture For Electronic Document Commerce
-
-
Constantas, D.1
-
8
-
-
0031258214
-
Computer immunology
-
Forrest, S.; Hofmeyr, S.; Somayaji, A. Computer immunology. Communications of the ACM, Vol. 40, No. 10, pp. 88-96. 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
-
9
-
-
84904265014
-
Protecting Mobile Web-Commerce Agents with Smartcards
-
Fünfrocken, S. Protecting Mobile Web-Commerce Agents with Smartcards Proceedings of ASA/MA'99. 1999.
-
(1999)
Proceedings of ASA/MA'99
-
-
Fünfrocken, S.1
-
12
-
-
0001943763
-
Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts
-
Giovanni Vigna (Ed.), LNCS 1420 Springer Verlag
-
Hohl F. Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts. in Giovanni Vigna (Ed.), Mobile Agent Security, LNCS 1420 Springer Verlag, pp 91-113. 1998.
-
(1998)
Mobile Agent Security
, pp. 91-113
-
-
Hohl, F.1
-
16
-
-
84904263953
-
Una Solución Segura Basada en Java para la Comercialización de Contenidos Digitales. (in spanish
-
Ra-Ma, isbn 84-7897-431-8
-
Maña, A. Una Solución Segura Basada en Java para la Comercialización de Contenidos Digitales. (in spanish). Proceedings of the Sixth Spanish Conference on Cryptography and Information Security. Ra-Ma, isbn 84-7897-431-8, pp-243-252. 2000.
-
(2000)
Proceedings of the Sixth Spanish Conference On Cryptography and Information Security
, pp. 243-252
-
-
Maña, A.1
-
17
-
-
84904251980
-
-
Technical Report 14/2000, Department of Computer Science, University of Malaga
-
López, J.; Maña, A; Pimentel, P. Un Esquema Eficiente de Protección de Software Basado en Tarjetas Inteligentes. Technical Report 14/2000, Department of Computer Science, University of Malaga. 2000
-
(2000)
Un Esquema Eficiente De Protección De Software Basado En Tarjetas Inteligentes
-
-
López, J.1
Maña, A.2
Pimentel, P.3
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
February
-
Rivest, R. L.; Shamir, A.; Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Journal of the ACM, 21(2):120-126, February 1978.
-
(1978)
Journal of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
20
-
-
84904267861
-
A Manifesto Concerning the Legal Protection of Computer Programs: Why Existing Laws Fail To Provide Adequate Protection
-
Samuelson, P. A Manifesto Concerning the Legal Protection of Computer Programs: Why Existing Laws Fail To Provide Adequate Protection. Proceedings of KnowRight '95, pp 105-115. 1995.
-
(1995)
Proceedings of KnowRight '95
, pp. 105-115
-
-
Samuelson, P.1
-
21
-
-
84957893114
-
On Software Protection via Function Hiding
-
Springer-Verlag. LNCS 1525
-
Sander, T.; Tschudin C.F. On Software Protection via Function Hiding. Proceedings of Information Hiding'98. Springer-Verlag. LNCS 1525. pp 111-123. 1998.
-
(1998)
Proceedings of Information Hiding'98
, pp. 111-123
-
-
Sander, T.1
Tschudin, C.F.2
-
22
-
-
85034437667
-
A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques
-
Springer-Verlag. LNCS 0209
-
Schaumüller-Bichll, I.; Piller, E. A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques. Proceedings of Eurocrypt'84. Springer-Verlag. LNCS 0209, pp. 446-454. 1984.
-
(1984)
Proceedings of Eurocrypt'84
, pp. 446-454
-
-
Schaumüller-Bichll, I.1
Piller, E.2
|