Virtual private laboratories: concept and two building blocks
暂无分享,去创建一个
[1] Angelos D. Keromytis,et al. Implementing IPsec , 1997, GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record.
[2] Kanta Matsuura,et al. Digital Security Tokens and Their Derivatives , 2003 .
[3] Stephen T. Kent,et al. Security Architecture for the Internet Protocol , 1998, RFC.
[4] Hideki Imai,et al. Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack , 1998 .
[5] Sushil Jajodia,et al. Provisional Authorizations , 2001, E-Commerce Security and Privacy.
[6] Kanta Matsuura,et al. A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce , 2001, ICICS.
[7] Kazuo Ohta,et al. Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash , 1989, CRYPTO.
[8] W.A. Arbaugh,et al. Security for Virtual Private Intranets , 1998, Computer.
[9] Scott Hamilton. E-Commerce for the 21st Century , 1997, Computer.
[10] Kenneth R. Iversen. A Cryptographic Scheme for Computerized Elections , 1991, CRYPTO.
[11] Jennifer C. Davis. Protecting intellectual property in cyberspace , 1998, IEEE Technol. Soc. Mag..
[12] Patrick W. Dowd,et al. Network Security: It's Time to Take It Seriously (Guest Editors' Introduction) , 1998, Computer.
[13] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[14] Michael K. Reiter,et al. Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.
[15] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[16] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[17] R. Leahy,et al. On the design of maximally sparse beamforming arrays , 1991 .
[18] F. Black,et al. The Pricing of Options and Corporate Liabilities , 1973, Journal of Political Economy.
[19] David Chaum,et al. 'Minting' electronic cash , 1997 .
[20] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[21] Bruce Schneier,et al. Secure audit logs to support computer forensics , 1999, TSEC.
[22] K. Matsuura,et al. Selective minimum-norm solution of the biomagnetic inverse problem , 1995, IEEE Transactions on Biomedical Engineering.
[23] Hideki Imai,et al. Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks , 2000 .
[24] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.