


default search action
International Journal of Information Security, Volume 2
Volume 2, Number 1, November 2003
- Philip D. MacKenzie, Michael K. Reiter:

Networked cryptographic devices resilient to capture. 1-20 - Sigrid Gürgens, Javier López, René Peralta

:
Analysis of e-commerce protocols: Adapting a traditional technique. 21-36 - Joonsang Baek, Yuliang Zheng:

Zheng and Seberry's public key encryption scheme revisited. 37-44 - Elisa Bertino, Elena Ferrari, Andrea Perego

:
Content-based filtering of Web documents: the MaX system and the EUFORBIA project. 45-58 - Willi Geiselmann, Willi Meier, Rainer Steinwandt:

An attack on the isomorphisms of polynomials problem with one secret. 59-64
Volume 2, Number 2, January 2004
- Ed Dawson:

Preface to the special issue on PKI. 65 - Bob Blakley, G. R. Blakley:

All sail, no anchor II: Acceptable high-end PKI. 66-77 - Selwyn Russell:

Theory and benefits of recursive certificate structures. 78-90 - Javier López, Antonio Mana, José A. Montenegro, Juan J. Ortega:

PKI design based on the use of on-line certification authorities. 91-102 - Chi-Sung Laih, K. Y. Chen:

Generating visible RSA public keys for PKI. 103-109 - Jose L. Muñoz, Jordi Forné

, Oscar Esparza
, Miguel Soriano
:
Certificate revocation system implementation based on the Merkle hash tree. 110-124
Volume 2, Number 3-4, August 2004
- Corrado Priami:

Preface to the special issue on Security in global computing. 125 - David Teller, Pascal Zimmer, Daniel Hirschkoff:

Using ambients to control resources. 126-144 - Mikael Buchholtz, Hanne Riis Nielson

, Flemming Nielson
:
A calculus for control flow analysis of security protocols. 145-167 - Roberto Gorrieri, Ruggero Lanotte, Andrea Maggiolo-Schettini, Fabio Martinelli, Simone Tini, Enrico Tronci:

Automated analysis of timed security: a case study on web privacy. 168-186 - Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari:

Stack inspection and secure program transformations. 187-217 - Philip D. MacKenzie, Michael K. Reiter:

Two-party generation of DSA signatures. 218-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














