Pub Date : 2020-01-09DOI: 10.1007/978-1-4419-5906-5_1298
A. Canteaut, Gerald Brose, H. Cankaya, A. Estes, S. De Capitani di Vimercati, D. Martinenghi, Y. Desmedt, Marijke De Soete, A. Biryukov, P. Samarati, A. Campi, S. Paraboschi, K. LeFevre, Bee-Chung Chen, D. Boneh, B. Preneel, F. L. Bauer, C. Carlet, Scott A. Crosby, D. Wallach, W. Enck, G. Bleumer, Yi Yang, Sencun Zhu, S. Köpsell, M. Srivatsa, Arun Iyengar, C. Meadows, V. Venkatakrishnan, Sebastiaan Indesteege, B. Kaliski, Sean W. Smith, Marijke De Soete, J. Black, E. Cankaya, R. Zuccherato, G. Kabatiansky, B. Smeets, T. Helleseth, D. Naccache, E. Cronin
{"title":"Access Lists","authors":"A. Canteaut, Gerald Brose, H. Cankaya, A. Estes, S. De Capitani di Vimercati, D. Martinenghi, Y. Desmedt, Marijke De Soete, A. Biryukov, P. Samarati, A. Campi, S. Paraboschi, K. LeFevre, Bee-Chung Chen, D. Boneh, B. Preneel, F. L. Bauer, C. Carlet, Scott A. Crosby, D. Wallach, W. Enck, G. Bleumer, Yi Yang, Sencun Zhu, S. Köpsell, M. Srivatsa, Arun Iyengar, C. Meadows, V. Venkatakrishnan, Sebastiaan Indesteege, B. Kaliski, Sean W. Smith, Marijke De Soete, J. Black, E. Cankaya, R. Zuccherato, G. Kabatiansky, B. Smeets, T. Helleseth, D. Naccache, E. Cronin","doi":"10.1007/978-1-4419-5906-5_1298","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1298","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128251611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-15DOI: 10.1007/978-1-4419-5906-5_547
Sebastiaan Indesteege
{"title":"Aria","authors":"Sebastiaan Indesteege","doi":"10.1007/978-1-4419-5906-5_547","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_547","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125465289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-23DOI: 10.1007/0-387-23483-7_124
G. Bleumer
{"title":"Electronic payment","authors":"G. Bleumer","doi":"10.1007/0-387-23483-7_124","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_124","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122679546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-04-01DOI: 10.1007/978-1-4419-5906-5_506
Niels Provos
{"title":"Firewall","authors":"Niels Provos","doi":"10.1007/978-1-4419-5906-5_506","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_506","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-08DOI: 10.1007/978-1-4419-5906-5_120
Scott E. Coull
{"title":"Traffic Analysis","authors":"Scott E. Coull","doi":"10.1007/978-1-4419-5906-5_120","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_120","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129173379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-30DOI: 10.1007/978-1-4419-5906-5_1322
R. Sahay
{"title":"Multifactor Authentication","authors":"R. Sahay","doi":"10.1007/978-1-4419-5906-5_1322","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1322","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128469095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-02-07DOI: 10.1007/978-1-4419-5906-5_1153
L. Weng
{"title":"Geometry of Numbers","authors":"L. Weng","doi":"10.1007/978-1-4419-5906-5_1153","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1153","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-01-11DOI: 10.1007/978-1-4419-5906-5_1086
Tecnología
{"title":"Subscriber Identity Module","authors":"Tecnología","doi":"10.1007/978-1-4419-5906-5_1086","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1086","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122376185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2009-02-26DOI: 10.1007/978-1-4419-5906-5_1075
博克尔·罗森伯, 沃尔夫冈·布尔
{"title":"Integrated Circuit Card","authors":"博克尔·罗森伯, 沃尔夫冈·布尔","doi":"10.1007/978-1-4419-5906-5_1075","DOIUrl":"https://doi.org/10.1007/978-1-4419-5906-5_1075","url":null,"abstract":"","PeriodicalId":388560,"journal":{"name":"Encyclopedia of Cryptography and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127421462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}