Author:
de Koning Gans Gerhard,Verheul Eric R.
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. Barker, E., Kelsey, J.: Recommendation for Random Number Generation Using Deterministic Random Bit Generators (revised). NIST Special Publication 800, 90 (2007)
2. Bellare, M., Rogaway, P., Spies, T.: Format-Preserving Feistel-Based Encryption Mode (November 2009), http://csrc.nist.gov/groups/ST/toolkit/BCM/modes_development.html
3. Black, J., Rogaway, P.: Ciphers with arbitrary finite domains. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, p. 114–130. Springer, Heidelberg (2002)
4. Blundo, C., Cimato, S., De Bonis, A.: A Lightweight Protocol for the Generation and Distribution of Secure E-Coupons. In: WWW 2002: Proceedings of the 11th International Conference on World Wide Web, pp. 542–552. ACM, New York (2002)
5. Blundo, C., Cimato, S., De Bonis, A.: Secure E-Coupons. Electronic Commerce Research 5(1), 117–139 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The code for securing web applications;Journal of Information and Optimization Sciences;2019-04-24
2. Securing Shared Systems;Lecture Notes in Computer Science;2016