UEPS - A Second Generation Electronic Wallet
暂无分享,去创建一个
[1] David Chaum,et al. Achieving Electronic Privacy , 1992 .
[2] Li Gong,et al. Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] D S Goodsell,et al. Visualizing biological molecules. , 1992, Scientific American.
[4] Virgil D. Gligor,et al. On belief evolution in authentication protocols , 1991, Proceedings Computer Security Foundations Workshop IV.
[5] Yvo Desmedt,et al. Public-Key Systems Based on the Difficulty of Tampering (Is There a Difference Between DES and RSA?) , 1986, CRYPTO.
[6] Richard Outerbridge,et al. Des Watch: an Examination of the Sufficiency of the Data Encryption Standard for Financial Institution Information Security in the 1990's , 1991, Cryptologia.
[7] Li Gong,et al. Logics for cryptographic protocols-virtues and limitations , 1991, Proceedings Computer Security Foundations Workshop IV.
[8] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.