Infrastructure Security
暂无分享,去创建一个
[1] Simone Fischer Hübner. IT-Security and Privacy : Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .
[2] Erland Jonsson,et al. Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.
[3] Jacques Traoré. Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems , 1999, ACISP.
[4] Yiannis Tsiounis,et al. Anonymity Control in E-Cash Systems , 1997, Financial Cryptography.
[5] L. Hong,et al. Can multibiometrics improve performance , 1999 .
[6] Eric Ericsson Vod,et al. Intermediate Report: Results of Review, Requirements and Reference Architecture , 2001 .
[7] Claudia Eckert,et al. Internet Anonymity: Problems and Solutions , 2001, SEC.
[8] Dogan Kesdogan,et al. Privacy Enhanced Intrusion Detection , 1999 .
[9] Sharath Pankanti,et al. Evaluation techniques for biometrics-based authentication systems (FRR) , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[10] Hannes Federrath,et al. Project “anonymity and unobservability in the Internet” , 2000, CFP '00.
[11] Ross J. Anderson,et al. Optical Fault Induction Attacks , 2002, CHES.
[12] Anil K. Jain,et al. Decision-Level Fusion in Fingerprint Verification , 2001, Multiple Classifier Systems.
[13] Mitsuru Matsui,et al. New Block Encryption Algorithm MISTY , 1997, FSE.
[14] Norman Poh,et al. Hybrid Biometric Person Authentication Using Face and Voice Features , 2001, AVBPA.
[15] Alex Biryukov,et al. Real Time Cryptanalysis of the Alleged A5/1 on a PC , 1999 .
[16] Kai Rannenberg,et al. Pseudonymous audit for privacy enhanced intrusion detection , 1997, SEC.
[17] Alex Biryukov,et al. Real Time Cryptanalysis of A5/1 on a PC , 2000, FSE.
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.