default search action
International Journal of Information Security, Volume 3
Volume 3, Number 1, October 2004
- Michael Waidner:
Preface. 1 - Philippa J. Hopcroft, Gavin Lowe:
Analysing a stream authentication protocol using model checking. 2-13 - Joachim Biskup, Piero A. Bonatti:
Controlled query evaluation for enforcing confidentiality in complete information systems. 14-27 - Sean W. Smith:
Outbound authentication for programmable secure coprocessors. 28-41 - Michael Backes, Birgit Pfitzmann:
Computational probabilistic noninterference. 42-60
Volume 3, Number 2, November 2004
- Vanesa Daza, Javier Herranz, Germán Sáez:
Protocols useful on the Internet from distributed signature schemes. 61-69 - Mark Burgess, Geoffrey Canright, Kenth Engø-Monsen:
A graph-theoretical model of computer security. 70-85 - Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. 86-98 - Antonio Mana, Javier López, Juan J. Ortega, Ernesto Pimentel, José M. Troya:
A framework for secure execution of software. 99-112 - Habtamu Abie, Pål Spilling, Bent Foyn:
A distributed digital rights management model for secure information-distribution systems. 113-128
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.