Information Technology Reference
In-Depth Information
7. Lysyanskaya, A., Rivest, R.L., Sahai, A., Wolf, S.: Pseudonym systems. In Selected
Areas in Cryptography (1999) 184-199
8. Mjolsnes, S.Fr.: Privacy, cryptographic pseudonyms, and the state of health. Lec-
ture Notes in Computer Science 739 (1993)
9. Pfitzmann, A., Kohntopp, M.: Anonymity, unobservability, and pseudonymity —
a proposal for terminology.
In Workshop on Design Issues in Anonymity and
Unobservability (2000) 1-9
10. Rankl, W., Eng, W.: Smart Card Handbook, 3rd edition . John Wiley & Sons
(2003)
11. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures
and Public-Key Cryptosystems. Communications of the ACM , 21 (1978) 120-126
12. RSA Laboratories. RSA-576 is factored!.
http://www.rsasecurity.com/rsalabs/node.asp?id=2096
13. RSA Laboratories. The RSA Challenge Numbers.
http://www.rsasecurity.com/rsalabs/node.asp?id=2093
14. Schartner, P.: Security Tokens - Basics, Applications, Management, and In-
frastructures . IT-Verlag (2001)
Search WWH ::




Custom Search