On Solutions to the Key Escrow Problem
Mark P. Hoyle, Chris J. Mitchell
|
Smart Cards – Requirements, Properties, and Applications
Klaus Vedder, Franz Weikmann
|
Securing Internet Electronic Mail
Mark Vandenwauver, Frank Jorissen
|
Block Ciphers — A Survey
Lars R. Knudsen
|
Internet Security Protocols
Walter Fumy
|
Security of Computer Networks
Jan Verschuren
|
An Analysis of Integrity Services in Protocols
Kapali Viswanathan, Colin Boyd, Ed Dawson
|
GSM: Security, Services, and the SIM
Klaus Vedder
|
Toward Optimal Player Weights in Secure Distributed Protocols
K. Srinathan, C. Pandu Rangan, V. Kamakoti
|
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function
Eike Kiltz
|
A Parallel Algorithm for Extending Cryptographic Hash Functions
Palash Sarkar, Paul J. Schellenberg
|
Autocorrelation Properties of Correlation Immune Boolean Functions
Subhamoy Maitra
|
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
Amr Youssef, Guang Gong
|
Introduction to Computer Security
Bart De Decker
|
Smart Card Security ‘How Can We Be So Sure?’
Ernst Bovelander
|