People
Martin Abadi
Jim Alves-Foss
Leonard Adleman
David Basin
Pierre Bieber
Matthew Bishop
Dominique
Bolignano
Colin Boyd
Stefan Brands
Johannes Buchmann
David
Chaum
Chye Lin Chee
John Clark
Pierpaolo Degano
Grit Denker
Ed Felten
Riccardo Focardi
Virgil D. Gligor
Li Gong
Adam J. Grove
Nevin Heintze
Amir
Herzberg
Jeremy Jacob
Stanislaw Jarecki
Uwe Jendricke
Rajashekar Kailar
Günter Karjoth
Richard A. Kemmerer
Holger Kenn
Darrell
Kindred
Shay
Kutten
Butler W. Lampson
Susan Landau
Peter Lee (alternative page
)
Francis Litterio
Gawin Lowe
Wenbo Mao
Fabio Massacci
Lewis McCarthy
Gary McGraw
Ari Gennady Medvinsky
Alfred Menezes
Jonathan K. Millen
Refik
Molva
Gunter Müller
George
Necula (alternative
page)
Roger Needham
Clifford Neuman
Paul C. van Oorschot
Larry Paulson
Andreas Pfitzmann
Birgit
Pfitzmann (alternative page)
Joachim Posegga
Kai Rannenberg
Michael Reiter
Ronald L. Rivest
Bill
Roscoe
Steve Schneider
Bruce Schneier
Ron Shamir
Stuart Stubblebine
Paul Syverson
Theodore
Ts'o
Mark
Tuttle
J.D. Tygar
Scott A. Vanstone
Luca Viganò
Jeannette
M. Wing
Tatu Ylönen
Moti Yung
Academic research groups and Projects
CAPSL: Common Authentication Protocol Specification Language
CIS Group (MIT)
Computer Security Laboratory (UC Davis)
Formal
verification of cryptographic protocols (NRL)
Network Security Section
(NRL)
GOST - Global Operating Systems
Technology Group (NetCash,
NetCheque(SM),
Kerberos)
COAST - Security Archive
(Purdue University)
Sicherheit: Fragen und Lösungsansätze (Uni-Dortmund)
Uni-GH Siegen -
Security-Server
SRI International
Computer Science Laboratory, Computer and Communications Security
Lehrstuhl Prof. B.
Pfitzmann
SEMPER (Secure Electronic Marketplace for
Europe)
SIRENE (SIcherheit in REchnerNEtzen
/ Security in Computer Networks)
Telematik - IIG
Freiburg
Verified
Bytecode project (Queen Mary and Westfield College, London)
Conferences and Workshops
Cryptography and security related conferences
ESORICS (European Symposium
on Research in Computer Security)
Usenix symposia
Foundations
for Secure Mobile Code Workshop
FuSeNetD Workshop 1999
1998
IEEE Symposium on Security and Privacy (see also IEEE TC on Security
and Privacy)
Workshop on Formal Methods and Security Protocols: 1998, 1999
Journals Cipher
(Newsletter of the IEEE Computer Society's TC on Security and
Privacy)
Computers
and Security
Journal of Computer
Security
Journal of
Cryptology
Books, papers, reports, bibliographies, ...
Index of Cryptography Papers Available Online
Handbook of Applied Cryptography
Articles and Literature
Security and Cryptography
Books
on cryptography, security, and related areas
Bibliography on
cryptography (theory.lcs.mit.edu)
Cryptography: The
Study of Encryption (contains also useful links on cryptography)
Crypto
Papers, Writings, and Books
CHACS
Publications (NRL)
CRYPTO
Publications (NRL)
Security
Reading Group (Stanford)
UVa
Security Group Bibliography (Virginia)
A
Logic of Authentication by Burrows, Abadi and Needham
Java Security:
Hostile Applets, Holes, and Antidotes by Gary McGraw and Ed
Felten (contains also useful links)
Security
Archive (Purdue)
Authentication,
Key Agreement, and Key Exchange Protocol Design & Analysis Citations
(UMass)
Mobile Code
Bibliography
Newsgroups and Mailing Lists
The Firewalls Mailing
List and Resources
ISS Security Library
Security Mailing
Lists
The Java Security Hotlist
E-Commerce
CyberCash
Lists
Digital Money
DigiCash
EDI: Electronic Payment Systems
Gradient Technologies, Inc. (NetCrusader)
IBM
Secure Electronic Commerce
IBM Internet Keyed Payment Protocols (iKP)
Java Commerce
Mondex Electronic Cash
NetBill Central and The NetBill Project
NetCash
NetCheque(SM)
SEMPER (Secure Electronic Marketplace for Europe)
SET Secure Electronic Transaction LLC
SET (Mastercard)
SET (Visa)
Electronic Commerce and Payment Systems
List of Electronic Payment Systems
Network Payment Mechanisms and Digital Cash
Open Trading Protocol
Payment mechanisms designed for the Internet
Companies and Products (Misc)
COMPUTATIONAL LOGIC, INC.
Cryptix
Cyberflex
DigiCrime, Inc.
Entrust.com
EURESCOM
Gradient
Hyperion
Internet Security Systems, Inc. (ISS)
Java
Kerberos
RSA Security
SSH
SSL (SSL techbrief)
TC Trust Center
Telstra
Trust Center (Deutsche
Telekom)
Verisign, Inc.
Further Links
ActiveX
(or how to put nuclear bombs in web pages)
Go back to The Home Page of Luca
Viganò
Last modified: Wed May 16 16:04:57 MET DST 2001
Computer and
Network Security Reference Index
Links
on Cryptography and Security
http://www.crypto.de/
Encryption Policy Resource
Page
Formal
Specification and Verification of the Equicrypt Protocol
The International PGP Home Page
Handbook of Applied Cryptography: Links
Web
pages of interest to cryptography researchers (includes list of
individuals, groups, books and journals)
Frequently Asked Questions -
Applet Security
The Java
Tutorial
The Java Security
Hotlist
Java and
security (page by Tommy Thorn)
W3C Security
Resources
Security
related links
Secret Key
Agreement by Public Discussion: Overview
Towards A
European Framework for Digital Signatures And Encryption, Executive
Summary
Yahoo!
- Computers and Internet:Security and Encryption
Security
and Cryptography (page by Jonathan Millen)
Smartcard security information page
Computer Virus Myths