Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. M. Abadi. Security protocols and their properties. In F. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation. IOS Press, 2000.
2. M. Abadi, Michael Burrows, Butler Lampson, and Gordon Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706–734, 1993.
3. R. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32–40, November 1994.
4. R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, 2001.
5. CEPSCO. Common Electronic Purse Specifications, 2001. Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers. 2.3, available from
http://www.cepsco.com
.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Java Development with UML;IFIP Advances in Information and Communication Technology;2002
2. Model-based Security Engineering with UML;Secure Systems Development with UML