Information Security
暂无分享,去创建一个
[1] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[2] Stuart Haber,et al. Improving the Efficiency and Reliability of Digital Time-Stamping , 1993 .
[3] Sean W. Smith,et al. Using a High-Performance, Programmable Secure Coprocessor , 1998, Financial Cryptography.
[4] Jan Willemson,et al. Time-Stamping with Binary Linking Schemes , 1998, CRYPTO.
[5] Naomaru Itoi. Secure Coprocessor Integration with Kerberos V5 , 2000, USENIX Security Symposium.
[6] David R. Safford,et al. Practical Private Information Retrieval with Secure Coprocessors , 2000 .
[7] Simon Shiu,et al. Encryption and key management in a SAN , 2002, First International IEEE Security in Storage Workshop, 2002. Proceedings..
[8] Marco Casassa Mont,et al. Trust services: a framework for service-based solutions , 2002, Proceedings 26th Annual International Computer Software and Applications.
[9] Ana Ferreira,et al. Towards accountability for Electronic Patient Records , 2003, 16th IEEE Symposium Computer-Based Medical Systems, 2003. Proceedings..
[10] Simon Shiu,et al. Hardware Security Appliances for Trust , 2003, iTrust.
[11] Stuart Haber,et al. How to time-stamp a digital document , 1990, Journal of Cryptology.