default search action
CQRE 1999: Düsseldorf, Germany
- Rainer Baumgart:
Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30 - December 2, 1999, Proceedings. Lecture Notes in Computer Science 1740, Springer 1999, ISBN 3-540-66800-4
Risk Management
- Dean Povey:
Developing Electronic Trust Policies Using a Risk Management Model. 1-16
Security Design
- Luigi Romano, Antonino Mazzeo, Nicola Mazzocca:
SECURE: A Simulation Tool for PKI Design. 17-29 - David A. Basin:
Lazy Infinite-State Analysis of Security Protocols. 30-42
Electronic Payment
- Markus Jakobsson, David M'Raïhi, Yiannis Tsiounis, Moti Yung:
Electronic Payments: Where Do We Go from Here?. 43-63
SmartCard Issues
- Roger Kehr, Joachim Posegga, Harald Vogt:
PCA: Jini-based Personal Card Assistant. 64-75 - Magnus Nyström, John G. Brainard:
An X.509-Compatible Syntax for Compact Certificates. 76-93
Applications
- Detlef Hühnlein, Johannes Merkle:
Secure and Cost Efficient Electronic Stamps. 94-100 - Kazue Sako:
Implementation of a Digital Lottery Server on WWW. 101-108
PKI-experiences (Workshop Notes)
- Javier López, Antonio Mana, Juan J. Ortega:
Cert'eM: Certification System Based on Electronic Mail Service Structure. 109-118 - Klaus Schmeh:
A Method for Developing Public Key Infrastructure Models. 119-126 - John Hughes:
The Realities of PKI Inter-operability. 127-132
Mobile Security
- Malte Borcherding:
Mobile Security - An Overview of GSM, SAT and WAP. 133-141 - Stefan Pütz, Roland Schmitz, Benno Tietz:
Secure Transport of Authentication Data in Third Generation Mobile Phone Networks. 142-152
Cryptography
- Nick Howgrave-Graham, Jean-Pierre Seifert:
Extending Wiener's Attack in the Presence of Many Decrypting Exponents. 153-166 - Silvio Micali, Leonid Reyzin:
Improving the Exact Security of Fiat-Shamir Signature Schemes. 167-182
Network Security (Workshop Notes)
- Yuen-Yan Chan:
On Privacy Issues of Internet Access Services via Proxy Servers. 183-191 - Bruce Schneier, Mudge, David A. Wagner:
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2). 192-203
Key Recovery
- Adam L. Young, Moti Yung:
Auto-recoverable Auto-certifiable Cryptosystems (A Survey). 204-218
Intrusion Detection
- Dusan Bulatovic, Dusan M. Velasevic:
A Distributed Intrusion Detection System Based on Bayesian Alarm Networks. 219-228
Interoperability
- Sarbari Gupta, Jerry Mulvenna, Srinivas Ganta, Larry Keys, Dale Walters:
Interoperability Characteristics of S/MIME Products. 229-241 - Montse Rubia, Juan Carlos Cruellas, Manuel Medina:
The DEDICA Project: The Solution to the Interoperability Problems between the X.509 and EDIFACT Public Key Infrastructures. 242-250
Biometrics
- Raul Sánchez-Reillo, Carmen Sanchez-Avila, Ana González-Marcos:
Multiresolution Analysis and Geometric Measures for Biometric Identification Systems. 251-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.