Securing an Electronic Legislature Using Threshold Signatures
暂无分享,去创建一个
[1] Sushil K. Sharma,et al. Handbook of Research on Information Security and Assurance , 2008 .
[2] R. Subramanian. Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions , 2008 .
[3] Jun Zheng,et al. Handbook of Research on Wireless Security , 2008 .
[4] Reza Barkhi,et al. An Empirical Investigation of an Individual's Perceived Need for Privacy and Security , 2008, Int. J. Inf. Secur. Priv..
[5] Dan Manson. Security, Privacy, and Politics in Higher Education , 2008 .
[6] Joseph Migga Kizza,et al. Digital Crime Investigation and Forensics , 2008 .
[7] Sasan Adibi,et al. End-to-End (E2E) Security Approach in WiMAX: A Security Technical Overview for Corporate Multimedia Applications , 2008 .
[8] Srinivas Padmanabhuni,et al. Security in Service-Oriented Architecture: Issues, Standards, and Implementations , 2008 .
[9] Panos Periorellis. Securing Web Services: Practical Usage of Standards and Specifications , 2007 .
[10] Joseph Migga Kizza. Securing the information infrastructure , 2007 .
[11] F. Nelson Ford,et al. Information Security Effectiveness: Conceptualization and Validation of a Theory , 2007, Int. J. Inf. Secur. Priv..
[12] Hamid R. Nemati. International Journal of Information Security and Privacy , 2007 .
[13] Maria Grazia Fugini,et al. Information Security Policies and Actions in Modern Integrated Systems , 2004 .
[14] Elisa Bertino,et al. Secure Data Dissemination , 2004 .