-
1
-
-
0028532579
-
Why cryptosystems fail
-
Nov.
-
R. J. Anderson, "Why cryptosystems fail," Comm. ACM, vol. 37, no. 11, pp. 32-40, Nov. 1994.
-
(1994)
Comm. ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.J.1
-
3
-
-
0027810202
-
The process group approach to reliable distributed computing
-
Dec.
-
K. P. Birman, "The process group approach to reliable distributed computing," Comm. ACM, vol. 36, no. 12, pp. 37-53/103, Dec. 1993.
-
(1993)
Comm. ACM
, vol.36
, Issue.12
-
-
Birman, K.P.1
-
7
-
-
0003801918
-
-
Request for Comments 1112, Internet Network Working Group, Aug.
-
S. Deering, "Host Extensions for IP Multicasting," Request for Comments 1112, Internet Network Working Group, Aug. 1989.
-
(1989)
Host Extensions for IP Multicasting
-
-
Deering, S.1
-
8
-
-
0028485511
-
MBONE: The multicast backbone
-
Aug.
-
H. Eriksson, "MBONE: The multicast backbone," Comm. ACM, vol. 37, no. 8, pp. 54-60, Aug. 1994.
-
(1994)
Comm. ACM
, vol.37
, Issue.8
, pp. 54-60
-
-
Eriksson, H.1
-
9
-
-
0029531472
-
Optimal authentication protocols resistant to password guessing attacks
-
County Kerry, Ireland, June
-
L. Gong, "Optimal authentication protocols resistant to password guessing attacks," in Proc. 8th IEEE Comp. Security Foundations Workshop, County Kerry, Ireland, June 1995, pp. 24-29.
-
(1995)
Proc. 8th IEEE Comp. Security Foundations Workshop
, pp. 24-29
-
-
Gong, L.1
-
10
-
-
0000367158
-
Multicast security and its extension to a mobile environment
-
Oct.
-
L. Gong and N. Shacham, "Multicast security and its extension to a mobile environment." ACM-Baltzer J. Wireless Networks, vol. 1, no. 3, pp. 281-295, Oct. 1995.
-
(1995)
ACM-Baltzer J. Wireless Networks
, vol.1
, Issue.3
, pp. 281-295
-
-
Gong, L.1
Shacham, N.2
-
11
-
-
0347470584
-
Fail-stop protocols: An approach to designing secure protocols
-
Urbana-Champaign, IL: Springer-Verlag, Sept. Dependable Computing and Fault-Tolerant Systems
-
L. Gong and P. Syverson, "Fail-stop protocols: An approach to designing secure protocols," in Proc. 5th IFIP Working Conf. on Dependable Computing for Critical Applications. Urbana-Champaign, IL: Springer-Verlag, Sept. 1995, Dependable Computing and Fault-Tolerant Systems, pp. 44-55.
-
(1995)
Proc. 5th IFIP Working Conf. on Dependable Computing for Critical Applications
, pp. 44-55
-
-
Gong, L.1
Syverson, P.2
-
12
-
-
0012944133
-
-
SRI International, Computer Science Laboratory, Menlo Park, CA 94025, Tech. Rep. SRI-CSL-96-07, July
-
S. Keung and L. Gong, "Enclaves in Java: API's and implementations," SRI International, Computer Science Laboratory, Menlo Park, CA 94025, Tech. Rep. SRI-CSL-96-07, July 1996.
-
(1996)
Enclaves in Java: API's and Implementations
-
-
Keung, S.1
Gong, L.2
-
13
-
-
0027557372
-
Issues in the design of a toolkit for supporting multiple group editors
-
Spring
-
M. Knister and A. Prakash, "Issues in the design of a toolkit for supporting multiple group editors," Comp. Sys., vol. 6, no. 2, pp. 135-166, Spring 1993.
-
(1993)
Comp. Sys.
, vol.6
, Issue.2
, pp. 135-166
-
-
Knister, M.1
Prakash, A.2
-
15
-
-
84896587185
-
-
RSA Data Security, Inc., Tech. Rep., Mar.
-
RSA Laboratories, "RSAREF version 2.0." RSA Data Security, Inc., Tech. Rep., Mar. 1994.
-
(1994)
RSAREF Version 2.0
-
-
-
17
-
-
0042458192
-
Secure agreement protocols: Reliable and atomic group multicast in rampart
-
Fairfax, VA, Nov.
-
M. Reiter, "Secure agreement protocols: Reliable and atomic group multicast in rampart," in Proc. 2nd ACM Conf. Comp. Comm. Security, Fairfax, VA, Nov. 1994, pp. 68-80.
-
(1994)
Proc. 2nd ACM Conf. Comp. Comm. Security
, pp. 68-80
-
-
Reiter, M.1
-
19
-
-
85084162417
-
File-based network collaboration system
-
Salt Lake City, UT, June
-
T. Takahashi, A. Shimbo, and M. Murota, "File-based network collaboration system," in Proc. 5th USENIX UNIX Security Symp., Salt Lake City, UT, June 1995, pp. 95-104.
-
(1995)
Proc. 5th USENIX UNIX Security Symp.
, pp. 95-104
-
-
Takahashi, T.1
Shimbo, A.2
Murota, M.3
|