共 50 条
- [31] A Methodology for Mining Security Tactics from Security Patterns 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 875 - 879
- [32] On the Security of a Practical Identification Scheme Journal of Cryptology, 1999, 12 : 247 - 260
- [35] The Security Risk Assessment Methodology INTERNATIONAL SYMPOSIUM ON SAFETY SCIENCE AND ENGINEERING IN CHINA, 2012, 2012, 43 : 600 - 609
- [36] INFORMATION SECURITY - A PRACTICAL APPROACH OFFICE ADMINISTRATION AND AUTOMATION, 1985, 46 (01): : 79 - 79
- [37] On the security of a practical identification scheme ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 344 - 353
- [39] Cryptography and the methodology of provable security APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 1 - 5
- [40] An evaluation methodology for the security of cryptosystems PRIME: 2008 PHD RESEARCH IN MICROELECTRONICS AND ELECTRONICS, PROCEEDINGS, 2008, : 113 - 115