Subscribe | About | Submit |
Sign In
March 2005 | Volume 11, No. 3
By William Stevenson
HTML | In the Digital Library Tags: Coding theory, Computational complexity and cryptography, Computer crime, Cryptography, Data encryption, Document types, Information theory, Mathematical foundations of cryptography, Number-theoretic computations, Operating systems security, Security and privacy
By Jarrod Trevathan
HTML | In the Digital Library Tags: Design, Domain-specific security and privacy architectures, Electronic commerce, Electronic data interchange, Human and societal aspects of security and privacy, Online advertising, Secure online transactions, Security, Web-based interaction
By Nick Papanikolaou
HTML | In the Digital Library Tags: Algorithms, Computational complexity and cryptography, Cryptography, Data encryption, Design, Number-theoretic computations, Operating systems security, Security
By Artemios G. Voyiatzis
HTML | In the Digital Library Tags: Algorithms, Communication complexity, Computing standards, RFCs and guidelines, Design, Mathematical foundations of cryptography, Number-theoretic computations, Public key (asymmetric) techniques, Public key encryption, Security
By Wing H. Wong
HTML | In the Digital Library Tags: Algorithms, Computer crime, Computing standards, RFCs and guidelines, Cryptanalysis and other attacks, Cryptography, Design, Intrusion/anomaly detection and malware mitigation, Number-theoretic computations, Operating systems security, Public key (asymmetric) techniques, Security
By Zachary A. Kissel
HTML | In the Digital Library Tags: Algorithms, Computational complexity and cryptography, Computer crime, Cryptography, Data encryption, Design, Number-theoretic computations, Security, Security and privacy