Bart De Schutter Trends in the Fight Against Computer-Related Delinquency. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:1-17 [Conf]
Bart Preneel Cryptographic Primitives for Information Authentication - State of the Art. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:49-104 [Conf]
Erik De Win, Bart Preneel Elliptic Curve Public-Key Cryptosystems - An Introduction. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:131-141 [Conf]
Walter Fumy Key Management Techniques. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:142-162 [Conf]
Klaus Vedder GSM: Security, Services, and the SIM. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:224-240 [Conf]
Peter Landrock TTPs Overview - Concepts and Review of the State of Art from a Technical Point of View. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:241-263 [Conf]
Joan Daemen Management of Secret Keys: Dynamic Key Handling. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:264-276 [Conf]
Berry Schoenmakers Security Aspects of the Ecash Payment System. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:338-352 [Conf]
Klaus Vedder International Standardisation of IT Security. [Citation Graph (0, 0)][DBLP] State of the Art in Applied Cryptography, 1997, pp:353-365 [Conf]