See What You Sign: Secure Implementations of Digital Signatures
暂无分享,去创建一个
[1] Warwick Ford,et al. Computer communication security - principles, standard protocols and techniques , 2008 .
[2] Ken Thompson,et al. Reflections on trusting trust , 1984, CACM.
[3] William M. Daley,et al. Security Requirements for Cryptographic Modules , 1999 .
[4] N. Asokan,et al. Optimistic protocols for fair exchange , 1997, CCS '97.
[5] Warwick Ford,et al. Secure electronic commerce , 1997 .
[6] Chris I. Dalton,et al. Applying military grade security to the Internet , 1997, Comput. Networks ISDN Syst..
[7] Peter G. Neumann,et al. Computer-related risks , 1994 .
[8] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[9] Sebastiano Trigila. Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services , 1998, Lecture Notes in Computer Science.
[10] Michael Waidner,et al. Architecture and Design of a Secure Electronic Marketplace , 1997 .
[11] Arnd Weber. Soziale Alternativen in Zahlungsnetzen , 1997 .
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Peter Sommer,et al. Title: Computer-related risks : Author: Peter G Neumann Publisher: Addison-Wesley Publishing Co. ISBN: 0-201-55805-X , 1995 .
[14] Birgit Pfitzmann,et al. Trusting Mobile User Devices and Security Modules , 1997, Computer.