Security Logics links

Contents

  • People
  • Academic research groups and Projects
  • Conferences and Workshops
  • Journals
  • Books, papers, reports, bibliographies, ...
  • Newsgroups and Mailing Lists
  • E-Commerce
  • Companies and Products (Misc)
  • Further links


    People

    Martin Abadi
    Jim Alves-Foss
    Leonard Adleman
    David Basin
    Pierre Bieber
    Matthew Bishop
    Dominique Bolignano
    Colin Boyd
    Stefan Brands
    Johannes Buchmann
    David Chaum
    Chye Lin Chee
    John Clark
    Pierpaolo Degano
    Grit Denker
    Ed Felten
    Riccardo Focardi
    Virgil D. Gligor
    Li Gong
    Adam J. Grove
    Nevin Heintze
    Amir Herzberg
    Jeremy Jacob
    Stanislaw Jarecki
    Uwe Jendricke
    Rajashekar Kailar
    Günter Karjoth
    Richard A. Kemmerer
    Holger Kenn
    Darrell Kindred
    Shay Kutten
    Butler W. Lampson
    Susan Landau
    Peter Lee (alternative page )
    Francis Litterio
    Gawin Lowe
    Wenbo Mao
    Fabio Massacci
    Lewis McCarthy
    Gary McGraw
    Ari Gennady Medvinsky
    Alfred Menezes
    Jonathan K. Millen
    Refik Molva
    Gunter Müller
    George Necula (alternative page)
    Roger Needham
    Clifford Neuman
    Paul C. van Oorschot
    Larry Paulson
    Andreas Pfitzmann
    Birgit Pfitzmann (alternative page)
    Joachim Posegga
    Kai Rannenberg
    Michael Reiter
    Ronald L. Rivest
    Bill Roscoe
    Steve Schneider
    Bruce Schneier
    Ron Shamir
    Stuart Stubblebine
    Paul Syverson
    Theodore Ts'o
    Mark Tuttle
    J.D. Tygar
    Scott A. Vanstone
    Luca Viganò
    Jeannette M. Wing
    Tatu Ylönen
    Moti Yung


    Academic research groups and Projects

    CAPSL: Common Authentication Protocol Specification Language
    CIS Group (MIT)
    Computer Security Laboratory (UC Davis)
    Formal verification of cryptographic protocols (NRL)
    Network Security Section (NRL)
    GOST - Global Operating Systems Technology Group (NetCash, NetCheque(SM), Kerberos)
    COAST - Security Archive (Purdue University)
    Sicherheit: Fragen und Lösungsansätze (Uni-Dortmund)
    Uni-GH Siegen - Security-Server
    SRI International Computer Science Laboratory, Computer and Communications Security
    Lehrstuhl Prof. B. Pfitzmann
    SEMPER (Secure Electronic Marketplace for Europe)
    SIRENE (SIcherheit in REchnerNEtzen / Security in Computer Networks)
    Telematik - IIG Freiburg
    Verified Bytecode project (Queen Mary and Westfield College, London)


    Conferences and Workshops

    Cryptography and security related conferences
    ESORICS (European Symposium on Research in Computer Security)
    Usenix symposia
    Foundations for Secure Mobile Code Workshop
    FuSeNetD Workshop 1999
    1998 IEEE Symposium on Security and Privacy (see also IEEE TC on Security and Privacy)
    Workshop on Formal Methods and Security Protocols: 1998, 1999


    Journals

    Cipher (Newsletter of the IEEE Computer Society's TC on Security and Privacy)
    Computers and Security
    Journal of Computer Security
    Journal of Cryptology


    Books, papers, reports, bibliographies, ...

    Index of Cryptography Papers Available Online
    Handbook of Applied Cryptography
    Articles and Literature
    Security and Cryptography
    Books on cryptography, security, and related areas
    Bibliography on cryptography (theory.lcs.mit.edu)
    Cryptography: The Study of Encryption (contains also useful links on cryptography)
    Crypto Papers, Writings, and Books
    CHACS Publications (NRL)
    CRYPTO Publications (NRL)
    Security Reading Group (Stanford)
    UVa Security Group Bibliography (Virginia)
    A Logic of Authentication by Burrows, Abadi and Needham
    Java Security: Hostile Applets, Holes, and Antidotes by Gary McGraw and Ed Felten (contains also useful links)
    Security Archive (Purdue)
    Authentication, Key Agreement, and Key Exchange Protocol Design & Analysis Citations (UMass)
    Mobile Code Bibliography


    Newsgroups and Mailing Lists

    The Firewalls Mailing List and Resources
    ISS Security Library
    Security Mailing Lists
    The Java Security Hotlist


    E-Commerce

    CyberCash
    DigiCash
    EDI: Electronic Payment Systems
    Gradient Technologies, Inc. (NetCrusader)
    IBM Secure Electronic Commerce
    IBM Internet Keyed Payment Protocols (iKP)
    Java Commerce
    Mondex Electronic Cash NetBill Central and The NetBill Project
    NetCash
    NetCheque(SM)
    SEMPER (Secure Electronic Marketplace for Europe)
    SET Secure Electronic Transaction LLC
    SET (Mastercard)
    SET (Visa)

    Lists

    Digital Money
    Electronic Commerce and Payment Systems
    List of Electronic Payment Systems
    Network Payment Mechanisms and Digital Cash
    Open Trading Protocol
    Payment mechanisms designed for the Internet


    Companies and Products (Misc)

    COMPUTATIONAL LOGIC, INC.
    Cryptix
    Cyberflex
    DigiCrime, Inc.
    Entrust.com
    EURESCOM
    Gradient
    Hyperion
    Internet Security Systems, Inc. (ISS)
    Java
    Kerberos
    RSA Security
    SSH
    SSL (SSL techbrief)
    TC Trust Center
    Telstra
    Trust Center (Deutsche Telekom)
    Verisign, Inc.


    Further Links

    ActiveX (or how to put nuclear bombs in web pages)
    Computer and Network Security Reference Index
    Links on Cryptography and Security
    http://www.crypto.de/
    Encryption Policy Resource Page
    Formal Specification and Verification of the Equicrypt Protocol
    The International PGP Home Page
    Handbook of Applied Cryptography: Links
    Web pages of interest to cryptography researchers (includes list of individuals, groups, books and journals)
    Frequently Asked Questions - Applet Security
    The Java Tutorial
    The Java Security Hotlist
    Java and security (page by Tommy Thorn)
    W3C Security Resources
    Security related links
    Secret Key Agreement by Public Discussion: Overview
    Towards A European Framework for Digital Signatures And Encryption, Executive Summary
    Yahoo! - Computers and Internet:Security and Encryption
    Security and Cryptography (page by Jonathan Millen)
    Smartcard security information page
    Computer Virus Myths


    Go back to The Home Page of Luca Viganò

    Last modified: Wed May 16 16:04:57 MET DST 2001