Documents Related by Co-Citation

354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
84 Programming Satan's Computer – Ross Anderson, Roger Needham
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
355 Tamper Resistance -- a Cautionary Note – Ross Anderson , Markus Kuhn - 1996
1007 Applied Cryptography – B Schneier - 1996
2693 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
58 La Cryptographie Militaire – A Kerckhoffs
24 Liability and Computer Security: Nine Principles – Ross J. Anderson
50 Analysis of the Sensitivity Attack against Electronic Watermarks in Images – Jean-paul M. G. Linnartz, Marten Van Dijk - 1998
17 Robust labeling method for copy protection of images – C Langelaar, J C A Vea der Lubbe, R L Lagendijk - 1997
134 A Secure, Robust Watermark for Multimedia – Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon - 1996
28 Secure Copyright Protection Techniques for Digital Images – Alexander Herrigel, Joseph O Ruanaidh, Holger Petersen, Shelby Pereira, THierry Pun - 1998
115 Towards Robust and Hidden Image Copyright Labeling – E. Koch, J. Zhao - 1995
81 A Review of Watermarking and the Importance of Perceptual Modeling – Ingemar J. Cox, Matt L. Miller - 1997
36 Compliance defects in public key cryptography – Don Davis - 1996
1113 The market for "lemons": quality, uncertainty and the market mechanism – George A Akerlof - 1970
30 Protocol Failure in the Escrowed Encryption Standard – Matt Blaze - 1994