Your search for 38897 returns 2310 document(s) |
How to build evidence in a public-key infrastructure for multi-domain environments, (LNCS-Lecture Notes in Computer Science 1361) Hal 53-65 |
Author: Bruno Crispo; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78 |
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Binding bit patterns to real world entities, (LNCS-Lecture Notes in Computer Science 1361) Hal 105-113 |
Author: Bruce Christianson; James A. Malcolm; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Low cost attacks on tamper resistant devices, (LNCS-Lecture Notes in Computer Science 1361) Hal 125-136 |
Author: Ross Anderson; Markus Kuhn; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Entity authentication and authenticated key transport protocols employing asymmetric techniques, (LNCS-Lecture Notes in Computer Science 1361) Hal 137-158 |
Author: Simon Blake-Wilson; Alfred Menezes; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
SG logic - a formal analysis technique for authentication protocols, (LNCS-Lecture Notes in Computer Science 1361) Hal 159-176 |
Author: Sigrid Gurgens; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to convert any digital signature scheme into a group signature scheme, (LNCS-Lecture Notes in Computer Science 1361) Hal 177-190 |
Author: Holger Petersen; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threshold key-recovery systems for RSA, (LNCS-Lecture Notes in Computer Science 1361) Hal 191-200 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On ideal non-perfect secret sharing schemes, (LNCS-Lecture Notes in Computer Science 1361) Hal 207-216 |
Author: Pascal Paillier; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults, (LNCS-Lecture Notes in Computer Science 1361) Hal 115-124 |
Author: F. Bao; R.H. Deng; Y. Hang; A. Jeng; A. D. Narasimhalu; T. Ngair; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|