![]() | ![]() |
1995 | ||
---|---|---|
3 | EE | Christopher L. J. Holloway: Controlling the use of cryptographic keys. Computers & Security 14(7): 587-598 (1995) |
2 | EE | Christopher L. J. Holloway: Controlling digital signature services using a smartcard. Computers & Security 14(8): 681-690 (1995) |
1992 | ||
1 | Christopher L. J. Holloway: Cryptography and the Art of Securing Transactions. SEC 1992: 127-137 |