A. Canteaut, Gerald Brose, H. Cankaya, A. Estes, S. De Capitani di Vimercati, D. Martinenghi, Y. Desmedt, Marijke De Soete, A. Biryukov, P. Samarati, A. Campi, S. Paraboschi, K. LeFevre, Bee-Chung Chen, D. Boneh, B. Preneel, F. L. Bauer, C. Carlet, Scott A. Crosby, D. Wallach, W. Enck, G. Bleumer, Yi Yang, Sencun Zhu, S. Köpsell, M. Srivatsa, Arun Iyengar, C. Meadows, V. Venkatakrishnan, Sebastiaan Indesteege, B. Kaliski, Sean W. Smith, Marijke De Soete, J. Black, E. Cankaya, R. Zuccherato, G. Kabatiansky, B. Smeets, T. Helleseth, D. Naccache, E. Cronin
{"title":"Access Lists","authors":"A. Canteaut, Gerald Brose, H. Cankaya, A. Estes, S. De Capitani di Vimercati, D. Martinenghi, Y. Desmedt, Marijke De Soete, A. Biryukov, P. Samarati, A. Campi, S. Paraboschi, K. LeFevre, Bee-Chung Chen, D. Boneh, B. Preneel, F. L. Bauer, C. Carlet, Scott A. Crosby, D. Wallach, W. Enck, G. Bleumer, Yi Yang, Sencun Zhu, S. Köpsell, M. Srivatsa, Arun Iyengar, C. Meadows, V. Venkatakrishnan, Sebastiaan Indesteege, B. Kaliski, Sean W. Smith, Marijke De Soete, J. Black, E. Cankaya, R. Zuccherato, G. Kabatiansky, B. Smeets, T. Helleseth, D. Naccache, E. Cronin","doi":"10.1007/978-1-4419-5906-5_1298","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1298","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Aria","authors":"Sebastiaan Indesteege","doi":"10.1007/978-1-4419-5906-5_547","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_547","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic payment","authors":"G. Bleumer","doi":"10.1007/0-387-23483-7_124","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_124","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122679546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Firewall","authors":"Niels Provos","doi":"10.1007/978-1-4419-5906-5_506","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_506","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traffic Analysis","authors":"Scott E. Coull","doi":"10.1007/978-1-4419-5906-5_120","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_120","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129173379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multifactor Authentication","authors":"R. Sahay","doi":"10.1007/978-1-4419-5906-5_1322","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1322","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometry of Numbers","authors":"L. Weng","doi":"10.1007/978-1-4419-5906-5_1153","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1153","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Subscriber Identity Module","authors":"Tecnología","doi":"10.1007/978-1-4419-5906-5_1086","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1086","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrated Circuit Card","authors":"博克尔·罗森伯, 沃尔夫冈·布尔","doi":"10.1007/978-1-4419-5906-5_1075","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1075","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}