1 |
J. Fong, H.K. Wong and Z. Cheng, 'Converting relational database into XML documents with DOM', Information and Software Technology, Vol.45, pp. 335-355, 2003
DOI
ScienceOn
|
2 |
Chris Lesniewski-Lass, M. Frans Kaashoek, 'SSL splitting: Securely serving data from untrusted caches', Computer Networks, Vol.48, pp. 763-779, 2005
DOI
ScienceOn
|
3 |
Ryutov, Neuman, 'Access control framework for distributed application', IETF, 2000
|
4 |
Kenneth G. Paterson, Geraint Price, 'A comparison between traditional public key infrastructures and identity-based cryptography', Information Security Technical Report, Vol.8, No.3, pp. 57-72, 2003
DOI
ScienceOn
|
5 |
Timothy G. Shoriak, 'SSL TLS Protocol Enablement for key Recovery', Computer & Security, pp. 100-104, 2000
|
6 |
T.M. E A.G.A.J. Loeffen, 'Succession in standardization: grafting XML onto SGML', Computer Standards & Interfaces, Vol.24, pp. 279-290, 2002
DOI
ScienceOn
|