Risk Assessment of a National Security Infrastructure
暂无分享,去创建一个
Kjell Jørgen Hole | Lars-Helge Netland | Yngve Espelid | André N. Klingsheim | Thomas Tjøstheim | Vebjørn Moen | Yngve Espelid | L. Netland | K. Hole | V. Moen | T. Tjøstheim
[1] Kjell Jørgen Hole,et al. A Proof of Concept Attack against Norwegian Internet Banking Systems , 2008, Financial Cryptography.
[2] J. Keady,et al. Case Study 1 , 2002, Doing English Grammar.
[3] William Stallings,et al. Cryptography and network security , 1998 .
[4] Kjell Jørgen Hole,et al. Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks , 2008, SEC.
[5] Kjell Jørgen Hole,et al. Case study: online banking security , 2006, IEEE Security & Privacy.
[6] Kristian Gjøsteen,et al. Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks , 2008, EuroPKI.
[7] Kjell Jørgen Hole,et al. Lessons from the Norwegian ATM System , 2007, IEEE Security & Privacy.
[8] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[9] Alan Calder,et al. Information Security Risk Management for ISO27001/ISO17799 , 2007 .
[10] Jianying Zhou. Non-Repudiation in Electronic Commerce , 2002, DEXA Workshops.