-
2
-
-
85016876571
-
Multicast routing in internetworks and extended LANs
-
S. E. Deering, "Multicast routing in internetworks and extended LANs," in Proc. ACM SIGCOMM'88, pp. 55-64.
-
Proc. ACM SIGCOMM'88
, pp. 55-64
-
-
Deering, S.E.1
-
3
-
-
0023569922
-
Zero knowledge proofs of identity
-
New York, NY
-
U. Feige, A. Fiat, and A. Shamir, "Zero knowledge proofs of identity," in Proc. 19th Ann. ACM Symp. Theory of Computing, New York, NY, 1987, pp. 210-217.
-
(1987)
Proc. 19th Ann. ACM Symp. Theory of Computing
, pp. 210-217
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
4
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir, "How to prove yourself: Practical solutions to identification and signature problems," in Advances in Cryptology - CRYPTO'86, 1987, pp. 186-194.
-
(1987)
Advances in Cryptology - CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
5
-
-
85013607444
-
A reliable multicast framework for light-weight sessions and application level framing
-
Cambridge, MA
-
S. Floyd, V. Jacobson, C.-G. Liu, S. McCanne, and L. Zhang, "A reliable multicast framework for light-weight sessions and application level framing," in Proc. ACM SIGCOMM'95, Cambridge, MA, pp. 342-356.
-
Proc. ACM SIGCOMM'95
, pp. 342-356
-
-
Floyd, S.1
Jacobson, V.2
Liu, C.-G.3
McCanne, S.4
Zhang, L.5
-
6
-
-
85032883059
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. El Gamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," in Advances in Cryptology - CRYPTO'84, 1985, pp. 10-18.
-
(1985)
Advances in Cryptology - CRYPTO'84
, pp. 10-18
-
-
El Gamal, T.1
-
8
-
-
0342830668
-
CryptoLib: Cryptography in software
-
Santa Clara, CA, Oct.
-
J. B. Lacy, D. P. Mitchell, and W. M. Schell, "CryptoLib: Cryptography in software," in Proc. USENIX: 4th UNIX Security Symposium, Santa Clara, CA, Oct. 1993, pp. 1-17.
-
(1993)
Proc. USENIX: 4th UNIX Security Symposium
, pp. 1-17
-
-
Lacy, J.B.1
Mitchell, D.P.2
Schell, W.M.3
-
9
-
-
0003605145
-
-
SRI Int., Menlo Park, CA, Tech. Rep. CSL 98
-
L. Lamport, "Constructing digital signatures from a one-way function," SRI Int., Menlo Park, CA, Tech. Rep. CSL 98, 1979.
-
(1979)
Constructing Digital Signatures from a One-way Function
-
-
Lamport, L.1
-
10
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
R. C. Merkle, "A digital signature based on a conventional encryption function," in Advances in Cryptology - CRYPTO '87, 1987, pp. 369-378.
-
(1987)
Advances in Cryptology - CRYPTO '87
, pp. 369-378
-
-
Merkle, R.C.1
-
12
-
-
85031775795
-
An improvement on the Fiat-Shamir identification and signature scheme
-
S. Micali and A. Shamir, "An improvement on the Fiat-Shamir identification and signature scheme," in Advances in Cryptology - CRYPTO'88, 1990, pp. 244-247.
-
(1990)
Advances in Cryptology - CRYPTO'88
, pp. 244-247
-
-
Micali, S.1
Shamir, A.2
-
13
-
-
0030609312
-
Iolus: A framework for scalable secure multicasting
-
Cannes, France
-
S. Mittra, "Iolus: A framework for scalable secure multicasting," in Proc. ACM SIGCOMM'97, Cannes, France, 1997, pp. 277-288.
-
(1997)
Proc. ACM SIGCOMM'97
, pp. 277-288
-
-
Mittra, S.1
-
14
-
-
0030609309
-
A flow-based approach to datagram security
-
Cannes, France
-
S. Mittra and T. Y. C. Woo, "A flow-based approach to datagram security," in Proc. ACM SIGCOMM'97, Cannes, France, 1997, pp. 221-234.
-
(1997)
Proc. ACM SIGCOMM'97
, pp. 221-234
-
-
Mittra, S.1
Woo, T.Y.C.2
-
15
-
-
0347227352
-
-
Digital Signature Standard, NIST FIPS PUB 86, U.S. Dept. Commerce, May
-
National Institute of Standards and Technology. Digital Signature Standard, NIST FIPS PUB 86, U.S. Dept. Commerce, May 1994.
-
(1994)
National Institute of Standards and Technology
-
-
-
17
-
-
0003614758
-
-
MIT Lab. Comput. Sci., Cambridge, MA, Tech. Rep. LCS/TR-212
-
M. O. Rabin, "Digitized signatures and public-key functions as intractible as factorization," MIT Lab. Comput. Sci., Cambridge, MA, Tech. Rep. LCS/TR-212, 1979.
-
(1979)
Digitized Signatures and Public-key Functions as Intractible as Factorization
-
-
Rabin, M.O.1
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
0032178082
-
Secure group communications using key graphs
-
Vancouver, B.C.
-
C. K. Wong, M. Gouda, and S. S. Lam, "Secure group communications using key graphs," in Proc. ACM SIGCOMM'98, Vancouver, B.C., 1998, pp. 68-79.
-
(1998)
Proc. ACM SIGCOMM'98
, pp. 68-79
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
21
-
-
84894342690
-
RSVP: A new resource ReSerVation Protocol
-
Oct.
-
L. Zhang, S. E. Deering, D. Estrin, S. Shenker, and D. Zappala, "RSVP: A new resource ReSerVation Protocol," IEEE Network Mag., vol. 9, no. 5, pp. 8-18, Oct. 1993.
-
(1993)
IEEE Network Mag.
, vol.9
, Issue.5
, pp. 8-18
-
-
Zhang, L.1
Deering, S.E.2
Estrin, D.3
Shenker, S.4
Zappala, D.5
|