ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Information technology - Security techniques - Security requirements for cryptographic modules
Mapping Intimacies
◽
10.3403/30402555
◽
2020
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Information Technology Security
Download Full-text
Related Documents
Cited By
References
User Considerations in Communicating Information Technology Security Requirements
Systems Science
◽
10.1007/978-1-4615-2862-3_83
◽
1993
◽
pp. 469-474
Author(s):
Adrian R. Warman
Keyword(s):
Information Technology
◽
Security Requirements
◽
Information Technology Security
Download Full-text
Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
10.3403/30316006u
◽
2015
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Security Attacks
◽
Physical Security
◽
Information Technology Security
◽
Mitigation Techniques
Download Full-text
Information Technology. Security Techniques. Physical Security Attacks, Mitigation Techniques and Security Requirements
10.3403/30316006
◽
2015
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Security Attacks
◽
Physical Security
◽
Information Technology Security
◽
Mitigation Techniques
Download Full-text
Information technology. Security techniques. Security requirements for cryptographic modules
10.3403/30091048
◽
2006
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Security requirements for cryptographic modules
10.3403/30204796
◽
2012
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Security requirements for cryptographic modules
10.3403/30091048u
◽
2015
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Information Technology Security
Download Full-text
Information technology - Security techniques - Security requirements for cryptographic modules
10.3403/30402555u
◽
2020
◽
Keyword(s):
Information Technology
◽
Security Requirements
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Digital signature scheme giving message recovery
10.3403/00327120
◽
1994
◽
Keyword(s):
Information Technology
◽
Digital Signature
◽
Signature Scheme
◽
Information Technology Security
◽
Message Recovery
◽
Digital Signature Scheme
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00327117
◽
1994
◽
Cited By ~ 2
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Information technology. Security techniques. Entity authentication mechanisms
10.3403/00553840u
◽
2015
◽
Keyword(s):
Information Technology
◽
Information Technology Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close