PKI design based on the use of on-line certification authorities Javier LopezAntonio MañaJuan J. Ortega Regular contribution 01 January 2004 Pages: 91 - 102
Theory and benefits of recursive certificate structures Selwyn Russell Regular contribution 01 January 2004 Pages: 78 - 90
All sail, no anchor II: Acceptable high-end PKI B. BlakleyG.R. Blakley Regular contribution 01 January 2004 Pages: 66 - 77
An attack on the isomorphisms of polynomials problem with one secret Willi GeiselmannWilli MeierRainer Steinwandt Regular contribution 01 November 2003 Pages: 59 - 64
Content-based filtering of Web documents: the MaX system and the EUFORBIA project Elisa BertinoElena FerrariAndrea Perego Regular contribution 01 November 2003 Pages: 45 - 58
Zheng and Seberry’s public key encryption scheme revisited Joonsang BaekYuliang Zheng Regular contribution 01 November 2003 Pages: 37 - 44
Analysis of e-commerce protocols: Adapting a traditional technique Sigrid GürgensJavier LopezRené Peralta Regular contribution 01 November 2003 Pages: 21 - 36
Networked cryptographic devices resilient to capture Philip MacKenzieMichael K. Reiter Regular contribution 01 November 2003 Pages: 1 - 20
Management of access control policies for XML document sources Barbara Carminati Elena Ferrari Regular contribution 01 July 2003 Pages: 236 - 260
Fair multi-party non-repudiation protocols Steve KremerOlivier Markowitch Regular contribution 01 July 2003 Pages: 223 - 235
A formal graph based framework for supporting authorization delegations and conflict resolutions Chun Ruan Vijay Varadharajan Regular contribution 01 July 2003 Pages: 211 - 222
Hybrid authentication based on noisy channels Valery Korzhik Guillermo Morales-Luna Regular contribution 01 July 2003 Pages: 203 - 210
Attacking a polynomial-based cryptosystem: Polly Cracker Rainer SteinwandtWilli GeiselmannRegine Endsuleit Regular contribution Pages: 143 - 148
Proposal on personal identifiers generated from the STR information of DNA Yukio ItakuraMasaki HashiyadaShigeo Tsujii Regular contribution Pages: 149 - 160
Compliant cryptologic protocols Ed DawsonKapali ViswanathanColin Boyd Regular contribution Pages: 189 - 202
Key recovery for the commercial environment J.M. Gonzáles NietoK. ViswanathanE. Dawson Regular contribution Pages: 161 - 174
A new electronic check system with reusable refunds S. KimH. Oh Regular contribution Pages: 175 - 188
A complete characterization of a family of key exchange protocols Takaaki MizukiHiroki ShizuyaTakao Nishizeki Regular contribution Pages: 131 - 142
Password hardening based on keystroke dynamics Fabian MonroseMichael K. ReiterSusanne Wetzel Regular contribution Pages: 69 - 83
Using AVL trees for fault-tolerant group key management Ohad RodehKenneth P. BirmanDanny Dolev Regular contribution Pages: 84 - 99
Securing SOAP e-services E. DamianiS. De Capitani di VimercatiP. Samarati Regular contribution Pages: 100 - 115
A t-private k-database information retrieval scheme Carlo BlundoPaolo D’ArcoAlfredo De Santis Regular contribution 31 January 2014 Pages: 64 - 68
The Elliptic Curve Digital Signature Algorithm (ECDSA) Don JohnsonAlfred MenezesScott Vanstone Regular contribution 31 January 2014 Pages: 36 - 63