|
Conferences in DBLP
- Dean Povey
Developing Electronic Trust Policies Using a Risk Management Model. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:1-16 [Conf]
- Luigi Romano, Antonino Mazzeo, Nicola Mazzocca
SECURE: A Simulation Tool for PKI Design. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:17-29 [Conf]
- David A. Basin
Lazy Infinite-State Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:30-42 [Conf]
- Markus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung
Electronic Payments: Where Do We Go from Here?. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:43-63 [Conf]
- Roger Kehr, Joachim Posegga, Harald Vogt
PCA: Jini-based Personal Card Assistant. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:64-75 [Conf]
- Magnus Nyström, John G. Brainard
An X.509-Compatible Syntax for Compact Certificates. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:76-93 [Conf]
- Detlef Hühnlein, Johannes Merkle
Secure and Cost Efficient Electronic Stamps. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:94-100 [Conf]
- Kazue Sako
Implementation of a Digital Lottery Server on WWW. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:101-108 [Conf]
- Javier Lopez, Antonio Mana, Juan J. Ortega
Cert'eM: Certification System Based on Electronic Mail Service Structure. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:109-118 [Conf]
- Klaus Schmeh
A Method for Developing Public Key Infrastructure Models. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:119-126 [Conf]
- John Hughes
The Realities of PKI Inter-operability. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:127-132 [Conf]
- Malte Borcherding
Mobile Security - An Overview of GSM, SAT and WAP. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:133-141 [Conf]
- Stefan Pütz, Roland Schmitz, Benno Tietz
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:142-152 [Conf]
- Nick Howgrave-Graham, Jean-Pierre Seifert
Extending Wiener's Attack in the Presence of Many Decrypting Exponents. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:153-166 [Conf]
- Silvio Micali, Leonid Reyzin
Improving the Exact Security of Fiat-Shamir Signature Schemes. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:167-182 [Conf]
- Yuen-Yan Chan
On Privacy Issues of Internet Access Services via Proxy Servers. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:183-191 [Conf]
- Bruce Schneier, Mudge, David Wagner
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:192-203 [Conf]
- Adam Young, Moti Yung
Auto-recoverable Auto-certifiable Cryptosystems (A Survey). [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:204-218 [Conf]
- Dusan Bulatovic, Dusan M. Velasevic
A Distributed Intrusion Detection System Based on Bayesian Alarm Networks. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:219-228 [Conf]
- Sarbari Gupta, Jerry Mulvenna, Srinivas Ganta, Larry Keys, Dale Walters
Interoperability Characteristics of S/MIME Products. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:229-241 [Conf]
- Montse Rubia, Juan Carlos Cruellas, Manuel Medina
The DEDICA Project: The Solution to the Interoperability Problems between the X.509 and EDIFACT Public Key Infrastructures. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:242-250 [Conf]
- Raul Sánchez-Reillo, Carmen Sanchez-Avila, Ana González-Marcos
Multiresolution Analysis and Geometric Measures for Biometric Identification Systems. [Citation Graph (0, 0)][DBLP] CQRE, 1999, pp:251-0 [Conf]
|