Efficient and provably secure key agreement (Englisch)
Freier Zugriff
- Neue Suche nach: Alexandris, N.
- Neue Suche nach: Burmester, M.
- Neue Suche nach: Chrissikopoulos, V.
- Neue Suche nach: Peppes, D.
- Neue Suche nach: Alexandris, N.
- Neue Suche nach: Burmester, M.
- Neue Suche nach: Chrissikopoulos, V.
- Neue Suche nach: Peppes, D.
In:
Information Systems Security
;
227-236
;
1996
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Efficient and provably secure key agreement
-
Beteiligte:Alexandris, N. ( Autor:in ) / Burmester, M. ( Autor:in ) / Chrissikopoulos, V. ( Autor:in ) / Peppes, D. ( Autor:in )
-
Erschienen in:Information Systems Security ; 227-236
-
Verlag:
- Neue Suche nach: Springer US
-
Erscheinungsort:Boston, MA
-
Erscheinungsdatum:01.01.1996
-
Format / Umfang:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
A practical solution to the complex human issues of information security designHitchings, Jean et al. | 1996
- 13
-
The Use of Business Process Models for Security Design in OrganisationsHolbein, R. / Teufel, S. / Bauknecht, K. et al. | 1996
- 23
-
An analyst’s view of IS securityKiountouzis, Evangelos A. / Kokolakis, Spyros A. et al. | 1996
- 39
-
Location Management Strategies Increasing Privacy in Mobile CommunicationKesdogan, Dogan / Federrath, Hannes / Jerichow, Anja / Pfitzmann, Andreas et al. | 1996
- 49
-
ID-Based Authentication for Mobile Conference CallWang, Shiuh-Jeng / Chin, Le-Pond / Chang, Jin-Fu / Tsai, Ywh-Ren et al. | 1996
- 61
-
New Security Paradigms: Orthodoxy and HeresyHosmer, Hilary H. et al. | 1996
- 74
-
Security Assurance in Information SystemsWilsher, Richard G. / Kurth, Helmut et al. | 1996
- 88
-
A Framework for Dealing with and Specifying Security Requirements in Information SystemsDubois, Eric / Wu, Suchun et al. | 1996
- 100
-
The effects of Time on Integrity in Information SystemsList, W. et al. | 1996
- 111
-
EPHOS Security Procurement of secure open systemsPope, N. H. / Ross, J. G. et al. | 1996
- 122
-
Canada’s computer crime laws: Ten years of experienceKratz, Martin P. J. / Verchere, Bennett Jones et al. | 1996
- 142
-
DELIVERY and INSTALLATION of SOFTWARE Disputes and the burden of proofGolvers, ir. Luc et al. | 1996
- 153
-
Information Security on the Electronic SuperhighwaySolms, S. H. et al. | 1996
- 167
-
A Taxonomy for Analyzing Hazards to Information SystemsBaskerville, Richard et al. | 1996
- 177
-
Models and tools for quantitative assessment of operational securityDacier, M. / Deswarte, Y. / Kaâniche, M. et al. | 1996
- 187
-
Activating dynamic countermeasures to reduce riskLabuschagne, L. / Eloff, J. F. P. et al. | 1996
- 199
-
Distributed registration and key distribution (DiRK)Oppliger, Rolf / Albanese, Andres et al. | 1996
- 209
-
On the Reconstruction of Shared SecretsHe, J. / Dawson, E. et al. | 1996
- 219
-
An Hierarchical Threshold Scheme with Unique Partial KeysHassler, Hannes / Hassler, Vesna / Posch, Reinhard et al. | 1996
- 227
-
Efficient and provably secure key agreementAlexandris, N. / Burmester, M. / Chrissikopoulos, V. / Peppes, D. et al. | 1996
- 237
-
Internetwork Access Control Using Public Key CertificatesPark, Hyun / Chow, Randy et al. | 1996
- 249
-
The security architecture of IRO-DBEßmayr, Wolfgang / Kastner, Friedrich / Pernul, Günther / Tjoa, A. Min et al. | 1996
- 259
-
Securely executing multilevel transactionsJajodia, Sushil / Smith, Ken P. / Blaustein, Barbara T. / Notargiacomo, L. et al. | 1996
- 271
-
A Decentralized Temporal Authorization ModelBertino, Elisa / Bettini, Claudio / Ferrari, Elena / Samarati, Pierangela et al. | 1996
- 283
-
Applications of keystroke analysis for improved login security and continuous user authenticationDr Furnell, Steven M. / Morrissey, Joseph P. / Sanders, Peter W. / Dr Stockel, Colin T. et al. | 1996
- 295
-
MoFAC: A Model for Fine-grained Access ControlSolms, Johan S. / Olivier, Martin S. / Solms, Sebastiaan H. et al. | 1996
- 306
-
A Discretionary Security Model for Object-oriented EnvironmentsRensburg, Wilna Jansen / Olivier, Martin S. et al. | 1996
- 319
-
Intention Modelling: Approximating Computer User Intentions for Detection and Prediction of IntrusionsSpyrou, Thomas / Darzentas, John et al. | 1996
- 337
-
An attack detection system for secure computer systems - Design of the ADSKantzavelou, Ioanna / Patel, Ahmed et al. | 1996
- 351
-
IT Security and Privacy EducationYngström, Louise et al. | 1996
- 365
-
A human approach to security management in HealthCareJames, Helen / Andronis, Katerina / Paul, William et al. | 1996
- 377
-
Security Enforcement in a European Medical Device Vigilance System NetworkVassilacopoulos, George / Chrissikopoulos, Vassilios / Peppes, Dimitrios et al. | 1996
- 387
-
Design of secure Medical Database SystemsPangalos, George J. / Khair, Marie G. et al. | 1996
- 405
-
Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findingsUttridge, Ian / Bazzana, Gualtiero / Giunchi, Massimo / Déler, Gemma / Geyres, Stéphane / Heiler, Josef et al. | 1996
- 417
-
SNMP-based Network Security Management using a Temporal Database ApproachApostolopoulos, Theodore K. / Daskalou, Victoria C. et al. | 1996
- 428
-
Security profile for interconnected open distributed systems with varying vulnerabilityNikitakos, Nikitas V. / Gritzalis, Stefanos A. / Georgiadis, Panagiotis J. et al. | 1996
- 438
-
A model for the detection of the message stream delay attackO’Connell, Sean / Patel, Ahmed et al. | 1996
- 452
-
Security Model for Distributed Object Framework and its Applicability to CORBAVaradharajan, Vijay / Hardjono, Thomas et al. | 1996
- 467
-
Software Quality Assurance: The underlying framework for achieving secure and reliable software systemsFrangos, Stelios A. et al. | 1996
- 477
-
Configuration Management - A basis of the high assurance software engineering processGast, Thomas / Keus, Klaus et al. | 1996
- 480
-
Multi-purpose security module based on smart cardsDelacour, E. et al. | 1996
- 482
-
An authentication service supporting domain-based access control policiesYialelis, N. / Sloman, M. et al. | 1996
- 485
-
On Security ModelsEckert, C. et al. | 1996
- 487
-
Risks on the Way to the Global Information SocietyFischer-Hübner, Simone / Schier, Kathrin et al. | 1996
- 489
-
CryptoManager++Baldin, Thilo / Bleumer, Gerrit et al. | 1996
- 492
-
Cryptographic key distribution and authentication protocols for secure group communicationHutchison, Andrew C. M. / Bauknecht, Kurt et al. | 1996
- 494
-
A New Hybrid Encryption Scheme for Computer NetworksProf Dr El-Hadidi, M. T. / Prof Dr Hegazi, N. H. / Eng Aslan, H. K. et al. | 1996
- 496
-
From zero-knowledge to a practical authentication protocolMatyáš, Václav Jr. et al. | 1996