Another approach to software key escrow encryption (Englisch)
Nationallizenz
- Neue Suche nach: Dawson, Ed
- Neue Suche nach: He, Jingmin
- Neue Suche nach: Dawson, Ed
- Neue Suche nach: He, Jingmin
In:
Information Security and Privacy
;
87-95
;
1996
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Another approach to software key escrow encryption
-
Beteiligte:Dawson, Ed ( Autor:in ) / He, Jingmin ( Autor:in )
-
Erschienen in:Information Security and Privacy ; 87-95Lecture Notes in Computer Science ; 1172 ; 87-95
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.1996
-
Format / Umfang:9 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
The changing face of information technology securityOrlowski, Steve et al. | 1996
- 14
-
Replicating the Kuperee authentication server for increased security and reliabilityHardjono, Thomas / Seberry, Jennifer et al. | 1996
- 27
-
Non-repudiation without public-keyTaylor, R. et al. | 1996
- 38
-
Investigation of non-repudiation protocolsHan, Yongfei et al. | 1996
- 48
-
A dynamic secret sharing scheme with cheater detectionHwang, Shin-Jia / Chang, Chin-Chen et al. | 1996
- 56
-
A nonlinear secret sharing schemeRenvall, Ari / Ding, Cunsheng et al. | 1996
- 67
-
The access structure of some secret-sharing schemesRenvall, Ari / Ding, Cunsheng et al. | 1996
- 79
-
On construction of resilient functionsWu, Chuan-Kun / Dawson, Ed et al. | 1996
- 87
-
Another approach to software key escrow encryptionDawson, Ed / He, Jingmin et al. | 1996
- 96
-
Cryptography based on transcendental numbersPieprzyk, Josef / Ghodosi, Hossein / Charnes, Chris / Safavi-Naini, Rei et al. | 1996
- 108
-
Breakthroughs in standardisation of IT security criteriaTroy, Eugene F. et al. | 1996
- 121
-
Tailoring authentication protocols to match underlying mechanismsChen, Liqun / Gollmann, Dieter / Mitchell, Christopher J. et al. | 1996
- 134
-
On the design of security protocols for mobile communicationsMu, Yi / Varadharajan, Vijay et al. | 1996
- 146
-
A framework for design of key establishment protocolsBoyd, Colin et al. | 1996
- 158
-
On period of multiplexed sequencesGolić, Jovan Dj. et al. | 1996
- 169
-
Edit distance correlation attacks on clock-controlled combiners with memoryGolić, Jovan Dj. et al. | 1996
- 182
-
A faster cryptanalysis of the self-shrinking generatorMihaljević, Miodrag J. et al. | 1996
- 190
-
Modeling a multi-level secure object-oriented database using viewsBaraani-Dastjerdi, Ahmad / Pieprzyk, Josef / Safavi-Naini, Reihaneh et al. | 1996
- 207
-
Support for joint action based security policiesVaradharajan, Vijay / Allen, Phillip et al. | 1996
- 219
-
Access control: The neglected frontierSandhu, Ravi et al. | 1996
- 228
-
On the quantitative assessment of behavioural securityJonsson, Erland / Andersson, Mikael et al. | 1996
- 242
-
On the modelling of preventive security based on a PC network intrusion experimentGustafson, Ulf / Jonsson, Erland / Olovsson, Tomas et al. | 1996
- 253
-
Evidential reasoning in network intrusion detection systemsEsmaili, Mansour / Safavi-Naini, Reihaneh / Pieprzyk, Josef et al. | 1996
- 266
-
A group-oriented (t, n) undeniable signature scheme without trusted centerLin, Chu-Hsing / Wang, Ching-Te / Chang, Chin-Chen et al. | 1996
- 275
-
Cryptosystems for hierarchical groupsGhodosi, Hossein / Pieprzyk, Josef / Charnes, Chris / Safavi-Naini, Rei et al. | 1996
- 287
-
On selectable collisionful hash functionsBakhtiari, S. / Safavi-Naini, R. / Pieprzyk, J. et al. | 1996
- 299
-
On password-based authenticated key exchange using collisionful hash functionsBakhtiari, S. / Safavi-Naini, R. / Pieprzyk, J. et al. | 1996
- 311
-
A new universal test for bit stringsSadeghiyan, Babak / Mohajeri, Javad et al. | 1996
- 320
-
An alternative model of quantum key agreement via photon couplingMu, Yi / Zheng, Yuliang et al. | 1996