|
Conferences in DBLP
- Hideki Sakurada, Yasuyuki Tsukada
A Role-Based Specification of the SET Payment Transaction Protocol. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:1-15 [Conf]
- Sebastiaan H. von Solms, M. V. Kisimov
Information Security: Mutual Authentication in E-Commerce. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:15-32 [Conf]
- Nikos Alexandris, Emmanouil Magkos, Vassilios Chrissikopoulos
Software-Based Receipt-Freeness in On-Line Elections. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:33-44 [Conf]
- Chih-Yin Lin, Tzong-Chen Wu, Jing-Jang Hwang
ID-Based Structured Mulitsignature Schemes. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:45-60 [Conf]
- Marina Pudovkina
Probabilistic Relations for the Solitaire Keystream Generator. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:61-74 [Conf]
- Nathalie Foster, Jeremy Jacob
Hazard Analysis for Security Protocol Requirements. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:75-92 [Conf]
- Vincent Naessens, Bart Vanhaute, Bart De Decker
Securing RMI Communication. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:93-106 [Conf]
- Jan Jürjens
Secure Java Development with UML. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:107-124 [Conf]
- Bart De Win, Bart Vanhaute, Bart De Decker
Security Through Aspect-Oriented Programming. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:125-138 [Conf]
- Aurélien Bonnet, Marc Lobelle
Extending a Campus Network with Remote Bubbles Using IPsec. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:139-152 [Conf]
- Joris Claessens, Bart Preneel, Joos Vandewalle
Combining World Wide Web and Wireless Security. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:153-172 [Conf]
- Niklas Borselius, Chris J. Mitchell, Aaron Wilson
On Mobile Agent Based Transactions in Moderately Hostile Environments. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:173-186 [Conf]
- Christopher Krügel, Thomas Toth, Engin Kirda
SPARTA, a Mobile Agent Based Instrusion Detection System. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:187-200 [Conf]
- Pieter von Dijken
Shell's Trust Domain Infrastructure Security Certification. [Citation Graph (0, 0)][DBLP] Network Security, 2001, pp:201-202 [Conf]
|