Personal security environment on Palm PDA
暂无分享,去创建一个
[1] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[2] Edward W. Felten,et al. Hand-Held Computers Can Be Better Smart Cards , 1999, USENIX Security Symposium.
[3] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[4] Dan Boneh,et al. Experimenting with Electronic Commerce on the PalmPilot , 1999, Financial Cryptography.
[5] Sean W. Smith,et al. Smart cards in hostile environments , 1996 .
[6] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[7] Ronald Cramer,et al. The ESPRIT Project CAFE - High Security Digital Payment Systems , 1994, ESORICS.
[8] Jan Willemson,et al. Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.
[9] Adam Shostack,et al. Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards , 1999, Smartcard.
[10] Donald W. Davies,et al. Use of the 'Signature Token' to Create a Negotiable Document , 1983, CRYPTO.
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Jonathan Grudin,et al. Development tools , 1995 .
[13] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .