Sciweavers

ACSAC   2000 Annual Computer Security Applications Conference
Wall of Fame | Most Viewed ACSAC-2000 Paper
ACSAC
2000
IEEE
13 years 10 months ago
Applications in Health Care using Public-Key Certificates and Attribute Certificates
Security infrastructures are increasingly used in the health care and welfare sector, particularly for providing security, like confidentiality, authenticity, integrity, nonrepudi...
Petra Wohlmacher, Peter Pharow
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source195
2Download preprint from source149
3Download preprint from source149
4Download preprint from source149
5Download preprint from source148
6Download preprint from source148
7Download preprint from source138
8Download preprint from source137
9Download preprint from source127
10Download preprint from source123
11Download preprint from source121
12Download preprint from source117
13Download preprint from source116
14Download preprint from source113
15Download preprint from source113
16Download preprint from source112
17Download preprint from source110
18Download preprint from source110
19Download preprint from source109
20Download preprint from source108
21Download preprint from source106
22Download preprint from source104
23Download preprint from source102
24Download preprint from source97
25Download preprint from source96
26Download preprint from source96
27Download preprint from source96
28Download preprint from source93
29Download preprint from source93
30Download preprint from source91
31Download preprint from source87
32Download preprint from source87
33Download preprint from source85
34Download preprint from source83
35Download preprint from source82
36Download preprint from source80
37Download preprint from source80
38Download preprint from source78
39Download preprint from source76
40Download preprint from source73