共 50 条
- [31] Contactless Security Token Enhanced Security by Using New Hardware Features in Cryptographic-Based Security Mechanisms TOWARDS HARDWARE-INTRINSIC SECURITY: FOUNDATIONS AND PRACTICE, 2010, : 259 - 279
- [32] The design of a cryptographic security architecture USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
- [33] Cryptographic security for mobile code 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 2 - 11
- [34] The gap-problems: A new class of problems for the security of cryptographic schemes PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 104 - 118
- [35] Cryptographic Security of Individual Instances INFORMATION THEORETIC SECURITY, 2009, 4883 : 195 - +
- [36] On the Bit Security of Cryptographic Primitives ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 : 3 - 28
- [38] A NEW DESIGN OF CRYPTOGRAPHIC KEY MANAGEMENT FOR HIPAA PRIVACY AND SECURITY REGULATIONS INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (11A): : 3923 - 3931
- [39] New Models and Methods for Estimating the Cryptographic Strength of Information Security Systems Zadiraka, V.K. (zvk140@ukr.net), 1600, Springer Science and Business Media, LLC (53): : 978 - 985
- [40] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270