Information Technology Reference
In-Depth Information
8. Borcea, K., Donker, H., Franz, E., Pfitzmann, A., Wahrig, H.: Towards privacy-
aware eLearning. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp.
167-178. Springer, Heidelberg (2006), http://dx.doi.org/10.1007/11767831_11
9. Cross, M.: Web Application Security. Syngress Publishing Inc. (2007)
10. Garfinkel, S.L.: Email-based identification and authentication: An alternative
to PKI? IEEE Security and Privacy 1, 20-26 (2003), http://portal.acm.org/
citation.cfm?id=1435589.1435788
11. Guitart, J., Carrera, D., Beltran, V., Torres, J., Ayguadé, E.: Designing an overload
control strategy for secure e-commerce applications. Comput. Netw. 51, 4492-4510
(2007), http://portal.acm.org/citation.cfm?id=1284912.1285118
12. Kumar, S., Dutta, K.: Investigation on security in LMS moodle. International
Journal of Information Technology and Knowledge Management 4, 223-238 (2011)
13. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography.
CRC Press, Boca Raton (1997)
14. Moore, J., Churchward, M.: Moodle 1.9 Extension Development. Packt Publishing
(2010)
15. Oppliger, R.: SSL and TSL: Theory and practice. Arthec House, Boston (2009)
16. Orue, A.B., Álvarez, G., Guerra, A., Pastor, G., Romera, M., Montoya, F.: Tri-
dent, a new pseudo random number generator based on coupled chaotic maps. In:
Herrero, Á., Corchado, E., Redondo, C., Alonso, Á., et al. (eds.) Computational
Intelligence in Security for Information Systems 2010. Advances in Intelligent and
Soft Computing, vol. 85, pp. 183-190. Springer, Heidelberg (2010)
17. Pfitzmann, B., Sadeghi, A.-R.: Anonymous fingerprinting with direct non-
repudiation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp.
401-414. Springer, Heidelberg (2000), http://portal.acm.org/citation.cfm?
id=647096.716985
18. Pfleeger, C.P., Pfleeger, S.L.: Security in computing, 3rd edn. Pearson Educatin
Inc., London (2003)
19. Raitman, R., Ngo, L., Augar, N.: Security in the online e-learning environment.
In: Proceedings of the Fifth IEEE International Conference on Advanced Learning
Technologies, ICALT 2005, pp. 702-706. IEEE Computer Society, Washington,
DC, USA (2005), http://dx.doi.org/10.1109/ICALT.2005.236
20. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R.,
Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg
(1985), http://portal.acm.org/citation.cfm?id=19478.19483
21. Stapic, Z., Orehovacki, T., Danic, M.: Determination of optimal security settings
for LMS moodle. In: 31st International Convention on Information and Communi-
cation Technology, Electronics and Microelectronics, MIPRO (2008)
22. Stoneburner, G., Hayden, C., Feringa, A.: Nist special publication 800-27: En-
gineering principles for information technology security (a baseline for achieving
security). Tech. rep., National Institute Standards and Technology (2001)
23. Weippl, E.: Security in E-Learning. Springer, Heidelberg (2005)
 
Search WWH ::




Custom Search