Web Services Security and E-business
暂无分享,去创建一个
G. S. V. Radha Krishna Rao | G. Radhamani | G. Radhamani | Jennifer Neidig | G. Radha | G. Rao | K. Rao
[1] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[2] Colin Boyd,et al. On a Limitation of BAN Logic , 1994, EUROCRYPT.
[3] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[4] Mark O'Neill,et al. Web Services Security , 2003 .
[5] Biswanath Mukherjee,et al. A network security monitor , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[7] Ben Soh,et al. One-Way Signature Chaining: a new paradigm for group cryptosystems , 2008, Int. J. Inf. Comput. Secur..
[8] George C. Necula,et al. Proof-carrying code , 1997, POPL '97.
[9] David H. Owens,et al. Existence and learning of oscillations in recurrent neural networks , 2000, IEEE Trans. Neural Networks Learn. Syst..
[10] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[11] George C. Necula,et al. Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.
[12] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[13] Stephen R. Tate,et al. ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention , 2004, ITCC.
[14] Colin Boyd,et al. Public key protocols for wireless communications , 1998, ICISC.
[15] Sixto Ortiz,et al. Is Business Intelligence a Smart Move? , 2002, Computer.
[16] Ivan Damgård,et al. Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes , 2000, ASIACRYPT.
[17] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[18] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[19] Elsabé Cloete,et al. Classification of malicious host threats in mobile agent computing , 2002 .
[20] Du Ye,et al. Design of a distributed intrusion detection system based on independent agents , 2004, International Conference on Intelligent Sensing and Information Processing, 2004. Proceedings of.
[21] Mario Vento,et al. A Performance Comparison of Five Algorithms for Graph Isomorphism , 2001 .
[22] Ghassan Chaddoud,et al. Dynamic group communication security , 2001, Proceedings. Sixth IEEE Symposium on Computers and Communications.
[23] Danny B. Lange,et al. Programming and Deploying Java¿ Mobile Agents with Aglets¿ , 1998 .
[24] Bhavani M. Thuraisingham,et al. Security constraint processing during the update operation in a multilevel secure database management system , 1991, Proceedings Seventh Annual Computer Security Applications Conference.
[25] Dilip D. Kandlur,et al. Key management for secure lnternet multicast using Boolean function minimization techniques , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[26] Joos Vandewalle,et al. (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions , 2003, TOIT.
[27] Mohamed G. Gouda,et al. Secure group communications using key graphs , 2000, TNET.
[28] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[29] Konstantin Beznosov,et al. Introduction to Web services and their security , 2005, Inf. Secur. Tech. Rep..
[30] Ronald L. Rivest,et al. The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.
[31] Martin Naedele. Standards for XML and Web Services Security , 2003, Computer.
[32] Ralph Arnote,et al. Hong Kong (China) , 1996, OECD/G20 Base Erosion and Profit Shifting Project.
[33] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[34] J. F. McClary,et al. NADIR: An automated system for detecting network intrusion and misuse , 1993, Comput. Secur..
[35] N. Asokan,et al. Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.
[36] Ton A. M. Spil,et al. Business intelligence in healthcare organizations , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[37] Marthie Schoeman,et al. Architectural components for the efficient design of mobile agent systems , 2003 .
[38] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[39] G. Gangadharan,et al. Business intelligence systems: design and implementation strategies , 2004, 26th International Conference on Information Technology Interfaces, 2004..
[40] Robert H. Deng,et al. Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[41] William M. Farmer,et al. Security for Mobile Agents: Issues and Requirements , 1996 .
[42] Luc Moreau,et al. Certificates for mobile code security , 2002, SAC '02.
[43] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[44] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[45] Colin Boyd,et al. Key Establishment Protocols for Secure Mobile Communications: A Selective Survey , 1998, ACISP.
[46] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[47] Jean-Jacques Quisquater,et al. The Exact Security of an Identity Based Signature and its Applications , 2004, IACR Cryptol. ePrint Arch..
[48] Witold Kinsner,et al. Transient analysis and genetic algorithms for classification , 1995, IEEE WESCANEX 95. Communications, Power, and Computing. Conference Proceedings.
[49] Robert J. Zuccherato,et al. An Attack on CFB Mode Encryption as Used by OpenPGP , 2005, Selected Areas in Cryptography.
[50] Frank Harary,et al. Graph Theory , 2016 .
[51] Matt Blaze,et al. Cryptographic Modes of Operation for the Internet , 2001 .
[52] Colin Boyd,et al. Development of authentication protocols: some misconceptions and a new approach , 1994, Proceedings The Computer Security Foundations Workshop VII.
[53] Dawn Xiaodong Song,et al. ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[54] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[55] Ashok Samal,et al. A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
[56] Vincent M. Stanford,et al. IEEE Pervasive Computing: Applications - Pervasive Computing Goes the Last Hundred Feet with RFID Systems , 2003, IEEE Distributed Syst. Online.
[57] Alan R. Simon,et al. Network security , 1994 .
[58] B. Soh,et al. Authenticating mobile agent platforms using signature chaining without trusted third parties , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.
[59] Thomas R. Gross,et al. TCP Vegas revisited , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[60] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[61] Morris Sloman,et al. Policy driven management for distributed systems , 1994, Journal of Network and Systems Management.
[62] Nen-Fu Huang,et al. Apply data mining to defense-in-depth network security system , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[63] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[64] David L. Tennenhouse,et al. Towards an active network architecture , 2007, Comput. Commun. Rev..
[65] Carlo Ghezzi,et al. Mobile Code Paradigms and Technologies: A Case Study , 1997, Mobile Agents.
[66] Liu Hao,et al. Business intelligence based group decision support system , 2001, 2001 International Conferences on Info-Tech and Info-Net. Proceedings (Cat. No.01EX479).
[67] Steven M. Bellovin,et al. Problem Areas for the IP Security Protocols , 1996, USENIX Security Symposium.
[68] Danny B. Lange,et al. A Security Model for Aglets , 1997, IEEE Internet Comput..
[69] Sheng Zhong,et al. Verifiable Distributed Oblivious Transfer and Mobile Agent Security , 2006, Mob. Networks Appl..
[70] Manfred Schimmler,et al. Area and time efficient modular multiplication of large integers , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.
[71] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[72] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[73] Stephen M. Matyas,et al. A proposed mode for triple-DES encryption , 1996, IBM J. Res. Dev..
[74] Eric J. Harder,et al. Key Management for Multicast: Issues and Architectures , 1999, RFC.
[75] William C. Fenner. Internet Group Management Protocol, Version 2 , 1997, RFC.
[76] Christian Geuer-Pollmann,et al. Web services and web service security standards , 2005, Inf. Secur. Tech. Rep..
[77] Gene Tsudik,et al. Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.
[78] Colin Boyd,et al. Towards formal analysis of security protocols , 1993, [1993] Proceedings Computer Security Foundations Workshop VI.
[79] Alan T. Sherman,et al. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization , 2000 .
[80] Eli Biham,et al. Cryptanalysis of Multiple Modes of Operation , 1994, Journal of Cryptology.
[81] L. F. Wilson,et al. Analysis of distributed intrusion detection systems using Bayesian methods , 2002, Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference (Cat. No.02CH37326).
[82] Yunhao Liu,et al. LANDMARC: Indoor Location Sensing Using Active RFID , 2004, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[83] Shiuh-Pyng Shieh,et al. Secure key agreement for group communications , 2001, Int. J. Netw. Manag..
[84] Eli Biham,et al. Cryptanalysis of the ANSI X9.52 CBCM mode , 2001, Journal of Cryptology.
[85] Royce Robbins,et al. Distributed Intrusion Detection Systems: An Introduction and Review , 2003 .
[86] Ed Dawson,et al. Classification of Authentication Protocols: A Practical Approach , 2000, ISW.
[87] Biswanath Mukherjee,et al. A system for distributed intrusion detection , 1991, COMPCON Spring '91 Digest of Papers.
[88] Intrusion detection technology research based high-speed network , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[89] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[90] Philippe Oechslin,et al. RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.
[91] Wayne A. Jansen,et al. Countermeasures for mobile agent security , 2000, Comput. Commun..
[92] D. Pointcheval. Neural Networks and their Cryptographic Applications , 1994 .
[93] Mario Piattini,et al. A Survey of Web Services Security , 2004, ICCSA.
[94] William Stallings,et al. Cryptography and network security , 1998 .
[95] Geoffrey Smith,et al. Language Issues in Mobile Program Security , 1998, Mobile Agents and Security.
[96] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[97] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[98] Kenneth H. Rosen,et al. Discrete Mathematics and its applications , 2000 .
[99] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[100] Daniel E. Geer,et al. Mobile Code Security , 1998, IEEE Internet Comput..
[101] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[102] Moti Yung,et al. Sliding Encryption: A Cryptographic Tool for Mobile Agents , 1997, FSE.
[103] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[104] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[105] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[106] Jan Camenisch,et al. Separability and Efficiency for Generic Group Signature Schemes , 1999, CRYPTO.
[107] Jacques Stern,et al. A new public key cryptosystem based on higher residues , 1998, CCS '98.
[108] C. Boyd,et al. Methodical use of cryptographic transformations in authentication protocols , 1995 .
[109] Shiuh-Pyng Shieh,et al. A secure multicast protocol for the internet's multicast backbone , 2001 .
[110] Matthew J. Moyer,et al. A survey of security issues in multicast communications , 1999, IEEE Network.
[111] Son T. Vuong,et al. A security architecture and design for mobile intelligent agent systems , 2001, SIAP.
[112] Morris J. Dworkin,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[113] Giuseppe Ateniese. Verifiable encryption of digital signatures and applications , 2004, TSEC.
[114] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[115] Rudolf Lide,et al. Finite fields , 1983 .
[116] David A. Wagner. Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation , 1998, FSE.
[117] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[118] Tomasz Imielinski,et al. Handling mobile clients: a case for indirect interaction , 1993, Proceedings of IEEE 4th Workshop on Workstation Operating Systems. WWOS-III.
[119] Bruce Schneier,et al. Environmental Key Generation Towards Clueless Agents , 1998, Mobile Agents and Security.
[120] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[121] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[122] Wolfgang Kinzel,et al. Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[123] Daniel S. Soper. A Framework for Automated Web Business Intelligence Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[124] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[125] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[126] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[127] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[128] Bruce Schneier,et al. Practical cryptography , 2003 .
[129] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[130] Wayne A. Jansen,et al. Mobile Agent Security , 1999 .
[131] Chris J. Mitchell. Cryptography for mobile security , 2004 .
[132] David Wong,et al. Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.
[133] Ran Canetti,et al. Multicast Security (MSEC) Group Key Management Architecture , 2005, RFC.
[134] Anand R. Tripathi,et al. Experiences and future challenges in mobile agent programming , 2001, Microprocess. Microsystems.
[135] Sajal K. Das,et al. An ubiquitous architectural framework and protocol for object tracking using RFID tags , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..
[136] W. J. Thron,et al. Encyclopedia of Mathematics and its Applications. , 1982 .
[137] Nicholas Kalouptsidis,et al. Efficient Algorithms for , 1999 .
[138] Eli Biham,et al. Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .
[139] Amos Fiat,et al. Zero-knowledge proofs of identity , 1987, Journal of Cryptology.
[140] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[141] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.
[142] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[143] L. Sydanheimo,et al. Use and interface definition of mobile RFID reader integrated in a smart phone , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..
[144] Eli Biham. Cryptanalysis of Triple Modes of Operation , 1999, Journal of Cryptology.
[145] Silvio Micali,et al. Accountable-subgroup multisignatures: extended abstract , 2001, CCS '01.
[146] Jun Li,et al. The Architecture of the Large-scale Distributed Intrusion Detection System , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).
[147] Matteo Golfarelli,et al. Beyond data warehousing: what's next in business intelligence? , 2004, DOLAP '04.
[148] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[149] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[150] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[151] Rolf Oppliger,et al. Security Technologies for the World Wide Web , 2000 .
[152] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[153] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[154] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[155] Ben Soh,et al. A novel method for authenticating mobile agents with one-way signature chaining , 2005, Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005..
[156] Philippe Oechslin,et al. Reducing Time Complexity in RFID Systems , 2005, Selected Areas in Cryptography.
[157] Mostafa Ammar,et al. Security issues and solutions in multicast content distribution: a survey , 2003 .
[158] Zhong-Yang Xiong,et al. Distributed intrusion detection based on clustering , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[159] Adi Shamir. Stream Ciphers: Dead or Alive? , 2004, ASIACRYPT.
[160] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[161] Warwick Ford,et al. Computer communication security - principles, standard protocols and techniques , 2008 .
[162] Antonio Corradi,et al. Security of mobile agents on the Internet , 2001, Internet Res..
[163] Adi Shamir,et al. Analysis of Neural Cryptography , 2002, ASIACRYPT.
[164] Vijay Varadharajan. Security enhanced mobile agents , 2000, CCS.
[165] Gary McGraw,et al. Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.
[166] Neil C. Rowe,et al. A Distributed Autonomous-Agent Network-Intrusion Detection and Response System , 1998 .
[167] William R. Parkhurst. Cisco Multicasting Routing and Switching , 1999 .
[168] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[169] Rajeev Gopalakrishna,et al. A Framework for Distributed Intrusion Detection using Interest-Driven Cooperative Agents , 2001 .
[170] Rossouw von Solms,et al. The utilization of artificial intelligence in a hybrid intrusion detection system , 2002 .
[171] A. Menezes,et al. Applications of Finite Fields , 1992 .
[172] Jonathan Katz,et al. A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols , 2000, USENIX Security Symposium.
[173] William M. Farmer,et al. Security for Mobile Agents: Authentication and State Appraisal , 1996, ESORICS.
[174] Kevin C. Almeroth,et al. IP Multicast Applications: Challenges and Solutions , 2001, RFC.
[175] Charles P. Pfleeger,et al. Security in computing , 1988 .
[176] Jonathan Katz,et al. Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG , 2002, ISC.
[177] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[178] Margaret E. Sereno,et al. Learning to See Rotation and Dilation with a Hebb Rule , 1990, NIPS.
[179] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[180] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[181] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[182] Cesare Stefanelli,et al. Flexible security policies for mobile agent systems , 2001, Microprocess. Microsystems.
[183] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[184] Berk Sunar,et al. An Efficient Optimal Normal Basis Type II Multiplier , 2001, IEEE Trans. Computers.
[185] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[186] Jizhou Sun,et al. Honeypot and scan detection in intrusion detection system , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[187] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[188] Ljiljana Brankovic,et al. An Overview of Security Issues and Techniques in Mobile Agents , 2004, Communications and Multimedia Security.
[189] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[190] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[191] Victor K.-W. Wei,et al. Preemptive distributed intrusion detection using mobile agents , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[192] Jean-Sébastien Coron,et al. Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption , 2003, ASIACRYPT.
[193] Russell Reed,et al. Pruning algorithms-a survey , 1993, IEEE Trans. Neural Networks.
[194] James C. Reynolds,et al. On-line intrusion detection and attack prevention using diversity, generate-and-test, and generalization , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.
[195] Gildas Avoine,et al. Privacy Issues in RFID Banknote Protection Schemes , 2004, CARDIS.
[196] Suvo Mittra,et al. Iolus: a framework for scalable secure multicasting , 1997, SIGCOMM '97.
[197] Anand R. Tripathi,et al. Mobile agent programming in Ajanta , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[198] Paolo Bellavista,et al. Security for Mobile Agents : Issues and Challenges , 2003 .
[199] David McGrew. Counter Mode Security: Analysis and Recommendations , 2002 .
[200] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[201] Bart Preneel,et al. On the Security of Double and 2-Key Triple Modes of Operation , 1999, FSE.
[202] Xiaohua Hu,et al. An OLAM framework for Web usage mining and business intelligence reporting , 2002, 2002 IEEE World Congress on Computational Intelligence. 2002 IEEE International Conference on Fuzzy Systems. FUZZ-IEEE'02. Proceedings (Cat. No.02CH37291).
[203] Fritz Hohl. Mobile agent security and reliability , 1998, Proceedings Ninth International Symposium on Software Reliability Engineering (Cat. No.98TB100257).
[204] Frank P. Coyle. Wireless Web: A Manager's Guide , 2001 .