Electronic Identity
暂无分享,去创建一个
Gary B. Wills | Norberto Nuno Gomes de Andrade | David Argles | Lisha Chen-Wilson | Michele Schiano di Zenise | G. Wills | David Argles | Lisha Chen-Wilson
[1] Philip E. T. Lewis,et al. Research Methods for Business Students (5th edn) , 2007 .
[2] P. Abrami,et al. Directions for Research and Development on Electronic Portfolios , 2005 .
[3] Ronald L. Rivest,et al. A Digital Signature Scheme Secure Against Adaptive Chosen Message Attack*: Extended Abstract , 1987 .
[4] George Wright,et al. Expert Opinions in Forecasting: The Role of the Delphi Technique , 2001 .
[5] H. A. Lingstone,et al. The Delphi Method: Techniques and Applications , 1976 .
[6] Martin Naedele. Standards for XML and Web Services Security , 2003, Computer.
[7] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[8] Anna Lysyanskaya,et al. Signature schemes and applications to cryptographic protocol design , 2002 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.