Documents Related by Co-Citation

354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
84 Programming Satan's Computer – Ross Anderson, Roger Needham
2890 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
353 Tamper Resistance -- a Cautionary Note – Ross Anderson , Markus Kuhn - 1996
1007 Applied Cryptography – Bruce Schneier - 1996
2689 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
57 La cryptographie militaire – A Kerckhoffs
24 Liability and Computer Security: Nine Principles – Ross J. Anderson
17 Robust labeling method for copy protection of images – C Langelaar, J C A Vea der Lubbe, R L Lagendijk - 1997
115 Towards Robust and Hidden Image Copyright Labeling – E. Koch, J. Zhao - 1995
29 Secure Copyright Protection Techniques for Digital Images – Alexander Herrigel, Joseph O Ruanaidh, Holger Petersen, Shelby Pereira, THierry Pun - 1998
50 Analysis of the Sensitivity Attack against Electronic Watermarks in Images – Jean-paul M. G. Linnartz, Marten Van Dijk - 1998
81 A Review of Watermarking and the Importance of Perceptual Modeling – Ingemar J. Cox, Matt L. Miller - 1997
134 A Secure, Robust Watermark for Multimedia – Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon - 1996
36 Compliance defects in public key cryptography – Don Davis - 1996
1108 The market for “lemons”: Quality uncertainty and the market mechanism,” Quart – G A Akerlof - 1970
30 Protocol Failure in the Escrowed Encryption Standard – Matt Blaze - 1994