Cryptography: Policy and Algorithms最新文献

筛选
英文 中文
Encryption and the Gloval Information Infrastructure: An Australian Perspective 加密与全球信息基础设施:澳大利亚视角
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032346
Steve Orlowski
{"title":"Encryption and the Gloval Information Infrastructure: An Australian Perspective","authors":"Steve Orlowski","doi":"10.1007/BFb0032346","DOIUrl":"https://doi.org/10.1007/BFb0032346","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"1984 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? 开放论坛-密码学:个人自由和执法-有可能达成协议吗?
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032343
W. Caelli
{"title":"Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement?","authors":"W. Caelli","doi":"10.1007/BFb0032343","DOIUrl":"https://doi.org/10.1007/BFb0032343","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy and Security Policy Choices in an NII Environment NII环境中的隐私和安全策略选择
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032344
W. Ware
{"title":"Privacy and Security Policy Choices in an NII Environment","authors":"W. Ware","doi":"10.1007/BFb0032344","DOIUrl":"https://doi.org/10.1007/BFb0032344","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117142251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Randomness Measures Related to Subset Occurrence 与子集发生相关的随机度量
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032353
Helen Gustafson, E. Dawson, J. Golic
{"title":"Randomness Measures Related to Subset Occurrence","authors":"Helen Gustafson, E. Dawson, J. Golic","doi":"10.1007/BFb0032353","DOIUrl":"https://doi.org/10.1007/BFb0032353","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132471809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Commercial Key Escrow: An Australian Perspective 商业密钥托管:澳大利亚视角
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032345
W. Caelli
{"title":"Commercial Key Escrow: An Australian Perspective","authors":"W. Caelli","doi":"10.1007/BFb0032345","DOIUrl":"https://doi.org/10.1007/BFb0032345","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Proposed Architecture for Trusted Third Party Services 可信第三方服务的建议体系结构
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032349
N. Jefferies, C. Mitchell, M. Walker
{"title":"A Proposed Architecture for Trusted Third Party Services","authors":"N. Jefferies, C. Mitchell, M. Walker","doi":"10.1007/BFb0032349","DOIUrl":"https://doi.org/10.1007/BFb0032349","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 96
Public-key Cryptography on Smart Cards 智能卡上的公钥加密
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032364
Andreas Fuchsberger, D. Gollmann, P. Lothian, K. Paterson, Abraham Sidiropoulos
{"title":"Public-key Cryptography on Smart Cards","authors":"Andreas Fuchsberger, D. Gollmann, P. Lothian, K. Paterson, Abraham Sidiropoulos","doi":"10.1007/BFb0032364","DOIUrl":"https://doi.org/10.1007/BFb0032364","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131656089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The CASS Shell CASS外壳
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032369
G. Mohay, Hasmukh Morarji, Q. L. Viet, L. Munday, W. Caelli
{"title":"The CASS Shell","authors":"G. Mohay, Hasmukh Morarji, Q. L. Viet, L. Munday, W. Caelli","doi":"10.1007/BFb0032369","DOIUrl":"https://doi.org/10.1007/BFb0032369","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Saving Dollars Makes Sense of Crypto Export Controls 加密货币出口管制可以节省美元
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032348
M. Ames
{"title":"Saving Dollars Makes Sense of Crypto Export Controls","authors":"M. Ames","doi":"10.1007/BFb0032348","DOIUrl":"https://doi.org/10.1007/BFb0032348","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132214164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low Order Approximation of Cipher Functions 密码函数的低阶逼近
Cryptography: Policy and Algorithms Pub Date : 1995-07-03 DOI: 10.1007/BFb0032354
W. Millan
{"title":"Low Order Approximation of Cipher Functions","authors":"W. Millan","doi":"10.1007/BFb0032354","DOIUrl":"https://doi.org/10.1007/BFb0032354","url":null,"abstract":"","PeriodicalId":217219,"journal":{"name":"Cryptography: Policy and Algorithms","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信