✦ LIBER ✦
A digital signature scheme based upon the theory of quadratic residues : C.C. Chang, J.K Jan and H. C. Kowng. Cryptologia, January, 1997, pp. 55–70
- Publisher
- Elsevier Science
- Year
- 1997
- Tongue
- English
- Weight
- 120 KB
- Volume
- 16
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
✦ Synopsis
data you are protecting. Based on the use of the Web site, identify the crucial threats. Set a list of the nine basic threats that are manageable by IT managers and cover the areas of greatest concern. These threats govern unauthorized read/write access, data interception and attempts to undermine electronic transactions. Map these threats to the appropriate protection technologies. The OURS guidelines can help IT managers make hard decisions about the degree of security risk they are willing to take. Data-