-
1
-
-
85031576667
-
Deliverable D02: Preliminary report on basic services, architecture and design
-
SEMPER Consortium SEMPER Project deliverable submitted to the European Commission (available from the authors); see for related information
-
N. Asokan et al., Deliverable D02: Preliminary report on basic services, architecture and design, Technical Report, SEMPER Consortium, 1996, SEMPER Project deliverable submitted to the European Commission (available from the authors); see url: http://www.semper.org for related information.
-
(1996)
Technical Report
-
-
Asokan, N.1
-
2
-
-
0027678308
-
Authentication and delegation with smart-cards
-
October
-
M. Abadi, M. Burrows, C. Kaufman, B. Lampson, Authentication and delegation with smart-cards, Science of Computer Programming 21 (2) (October 1993) 91-113.
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 91-113
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
3
-
-
0027758414
-
Why cryptosystems fail
-
in: V. Ashby (Ed.) Fairfax, Virginia, November
-
oss Anderson, Why cryptosystems fail, in: V. Ashby (Ed.), 1st ACM Conf. on Computer and Communications Security, Fairfax, Virginia, November 1993, pp. 215-227.
-
(1993)
1st ACM Conf. on Computer and Communications Security
, pp. 215-227
-
-
Oss, A.1
-
4
-
-
84976295016
-
Distance-bounding protocols
-
in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'93 Springer, Berlin, May
-
S. Brands, D. Chaum, Distance-bounding protocols, in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science, vol.765, Springer, Berlin, May 1993, pp. 344-359.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
June
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, M. Yung, Systematic design of a family of attack-resistant authentication protocols, IEEE Journal on Selected Areas in Communications 11 (5) (June 1993) 679-693.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
7
-
-
0004249393
-
The SSL Protocol: Version 3.0
-
Internet Draft Will be eventually replaced by TLS
-
A.O. Freier, P. Kariton, P.C. Kocher, The SSL Protocol: Version 3.0, Technical Report, Internet Draft, 1996, Will be eventually replaced by TLS.
-
(1996)
Technical Report
-
-
Freier, A.O.1
Kariton, P.2
Kocher, P.C.3
-
8
-
-
0003048077
-
The S/Key one-time password system
-
in: D. Nesset (General Chair), R. Shirey (Program Chair) (Eds.) San Diego, CA, February Internet Society
-
N. Haller, The S/Key one-time password system, in: D. Nesset (General Chair), R. Shirey (Program Chair) (Eds.), Symposium on Network and Distributed Systems Security, San Diego, CA, February 1994, Internet Society.
-
(1994)
Symposium on Network and Distributed Systems Security
-
-
Haller, N.1
-
9
-
-
0141481639
-
Soft tempest: Hidden data transmission using electromagnetic emanations
-
Portland, OR, April
-
M.G. Kuhn, R.J. Anderson, Soft tempest: hidden data transmission using electromagnetic emanations, Workshop on Information Hiding, Portland, OR, April 1998.
-
(1998)
Workshop on Information Hiding
-
-
Kuhn, M.G.1
Anderson, R.J.2
-
11
-
-
0029712968
-
Human-computer cryptography: An attempt
-
in: C. Neuman (Ed.) New Delhi, India, March
-
T. Matsumoto, Human-computer cryptography: an attempt, in: C. Neuman (Ed.), 3rd ACM Conference on Computer and Communications Security, New Delhi, India, March 1996, pp. 68-75.
-
(1996)
3rd ACM Conference on Computer and Communications Security
, pp. 68-75
-
-
Matsumoto, T.1
-
12
-
-
84995399871
-
Human identification through insecure channel
-
in: Advances in Cryptology - EUROCRYPT'91 Springer, Berlin, April
-
T. Matsumoto, H. Imai, Human identification through insecure channel, in: Advances in Cryptology - EUROCRYPT'91, Lecture Notes in Computer Science, vol. 547, Springer, Berlin, April 1991, pp. 409-421.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 409-421
-
-
Matsumoto, T.1
Imai, H.2
-
13
-
-
0028397595
-
Authentication of mobile users
-
March/April
-
R. Molva, D. Samfat, G. Tsudik, Authentication of mobile users, IEEE Network 8 (2) (March/April 1994) 26-35.
-
(1994)
IEEE Network
, vol.8
, Issue.2
, pp. 26-35
-
-
Molva, R.1
Samfat, D.2
Tsudik, G.3
-
14
-
-
84958648410
-
Visual authentication and identification
-
in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology - CRYPTO'97 Springer, Berlin, August
-
M. Naor, B. Pinkas, Visual authentication and identification, in: B.S. Kaliski Jr. (Ed.), Advances in Cryptology - CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, Springer, Berlin, August 1997, pp. 323-336.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 323-336
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December also Xerox Research Report, CSL-78-4, PARC
-
R.M. Needham, M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21 (12) (December 1978) 993-999, also Xerox Research Report, CSL-78-4, PARC.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
16
-
-
84926193517
-
Visual cryptography
-
in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'94 Springer-Verlag, Berlin Germany
-
M. Naor, A. Shamir, Visual cryptography, in: I.B. Damgard (Ed.), Advances in Cryptology - EUROCRYPT'94, Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, Berlin Germany, 1994.
-
(1994)
Lecture Notes in Computer Science
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
17
-
-
0031078841
-
Trusting mobile user devices and security modules
-
February
-
A. Pftizmann, B. Pfitzmann, M. Schunter, M. Waidner, Trusting mobile user devices and security modules, IEEE Computer 30 (2) (February 1997) 61-68.
-
(1997)
IEEE Computer
, vol.30
, Issue.2
, pp. 61-68
-
-
Pftizmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
18
-
-
23244458468
-
WWW electronic commerce and Java Trojan horses
-
Oakland, CA, November
-
J.D. Tygar, A. Whitten. WWW electronic commerce and Java Trojan horses, in: 2nd USENIX Workshop on Electronic Commerce, Oakland, CA, November 1996, pp. 243-250.
-
(1996)
In: 2nd USENIX Workshop on Electronic Commerce
, pp. 243-250
-
-
Tygar, J.D.1
Whitten, A.2
|