Trusting Mobile User Devices and Security Modules
暂无分享,去创建一个
Birgit Pfitzmann | Andreas Pfitzmann | Michael Waidner | Matthias Schunter | A. Pfitzmann | B. Pfitzmann | M. Schunter | M. Waidner | M. Waidner
[1] Steve H. Weingart. Physical Security for the μABYSS System , 1987, 1987 IEEE Symposium on Security and Privacy.
[2] Donald W. Davies,et al. Security for computer networks - an introduction to data security in teleprocessing and electronic funds transfer (2. ed.) , 1989, Wiley series in communication and distributed systems.
[3] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[4] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallet with Observers , 2002 .
[5] Martín Abadi,et al. Authentification and Delegation with Smart-Cards , 1993, Sci. Comput. Program..
[6] David Chaum,et al. Distance-Bounding Protocols (Extended Abstract) , 1994, EUROCRYPT.
[7] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[8] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[9] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[10] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[11] Ware Myers. On Trial at the Summer Olympic Games: Smart Cards , 1996, Computer.