Crypto in Europe - Markets, Law and Policy
暂无分享,去创建一个
[1] Steve Orlowski. Encryption and the Gloval Information Infrastructure: An Australian Perspective , 1995, Cryptography: Policy and Algorithms.
[2] R. Hanson. Can wiretaps remain cost-effective? , 1994, CACM.
[3] Wayne Madsen. Norwegian encryption standard moves forward , 1994 .
[4] Fred P. Brooks,et al. The Mythical Man-Month , 1975, Reliable Software.
[5] Ross J. Anderson,et al. Cryptographic credit control in pre-payment metering systems , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[6] Jr. Frederick P. Brooks,et al. The Mythical Man-Month: Essays on Softw , 1978 .
[7] Frederick P. Brooks,et al. The Mythical Man-Month: Essays on Softw , 1978 .
[8] Ross J. Anderson. UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.
[9] Ross J. Anderson. Solving a Class of Stream Ciphers , 1990, Cryptologia.
[10] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[11] P. Kidwell,et al. The mythical man-month: Essays on software engineering , 1996, IEEE Annals of the History of Computing.
[12] R. Anderson,et al. NHS-wide networking and patient confidentiality , 1995, BMJ.
[13] Wayne Madsen. NCIC criticized for open security and privacy doors , 1993 .
[14] Ross J. Anderson. Why cryptosystems fail , 1994, CACM.
[15] Ross J. Anderson. Liability and Computer Security: Nine Principles , 1994, ESORICS.