메뉴 건너뛰기




Volumn 4, Issue 4, 2000, Pages 36-44

Secure cookies on the web

Author keywords

[No Author keywords available]

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; ELECTRONIC COMMERCE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; RANDOM ACCESS STORAGE; WEB BROWSERS;

EID: 0034229770     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/4236.865085     Document Type: Article
Times cited : (98)

References (17)
  • 2
    • 0003533519 scopus 로고    scopus 로고
    • work in progress; Aug.
    • D.M. Kristol and L. Montulli, "HTTP State Management Mechanism," work in progress; available online at http://ftp. ietf.org/internet-drafts/draft-ietf-http-state-man-mec-12.txt, Aug. 1999.
    • (1999) HTTP State Management Mechanism
    • Kristol, D.M.1    Montulli, L.2
  • 3
    • 0005940850 scopus 로고    scopus 로고
    • work in progress; Apr.
    • K. Moore and N. Freed, "Use of HTTP State Management," work in progress; available online at http.7/ftp.ietf.org/ internet-drafts/draft-iesg-http-cookies-03.txt, Apr. 2000.
    • (2000) Use of HTTP State Management
    • Moore, K.1    Freed, N.2
  • 4
    • 18844361810 scopus 로고    scopus 로고
    • Smart certificates: Extending X.509 for secure attribute services on the web
    • U.S. Govt. Printing Office, Washington, D.C.
    • J.S. Park and R. Sandhu, "Smart Certificates: Extending X.509 for Secure Attribute Services on the Web," Proc. 22nd National Information Systems Security Conf., U.S. Govt. Printing Office, Washington, D.C., 1999.
    • (1999) Proc. 22nd National Information Systems Security Conf.
    • Park, J.S.1    Sandhu, R.2
  • 6
    • 0005091133 scopus 로고    scopus 로고
    • The internet and privacy legislation: Cookies for a threat?
    • West Virginia Univ. College of Law, Morgantown, W. Va.
    • V. Mayer-Schonberger, "The Internet and Privacy Legislation: Cookies for a Threat?", West Virginia J. Law and Technology, West Virginia Univ. College of Law, Morgantown, W. Va., 1997.
    • (1997) West Virginia J. Law and Technology
    • Mayer-Schonberger, V.1
  • 7
    • 0003508562 scopus 로고
    • Digital Signature Standard (DSS)
    • Nat'1 Inst. of Standards and Technology, Gaithersburg, Md.
    • Federal Information Processing Standards Publication, "Digital Signature Standard (DSS)," FIPS PUB 186, Nat'1 Inst. of Standards and Technology, Gaithersburg, Md., 1994.
    • (1994) FIPS PUB 186
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM,Vol. 21,No. 2,Feb. 1978, pp. 120-126.
    • (1978) Comm. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 10
    • 0343050450 scopus 로고
    • Using Kerberos for authentication on computer networks
    • Sept.
    • B.C. Neuman, "Using Kerberos for Authentication on Computer Networks," IEEE Comm., Vol. 32, No. 9, Sept. 1994.
    • (1994) IEEE Comm. , vol.32 , Issue.9
    • Neuman, B.C.1
  • 11
    • 0017018484 scopus 로고
    • New directions in cryptography
    • Nov.
    • W. Diffie and M.E. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, Vol. IT-22, No. 6, Nov. 1976, pp. 644-654.
    • (1976) IEEE Trans. Information Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 13
    • 0003629991 scopus 로고
    • FIPS 180-1, Nat'l Inst. of Standards and Technology, Gaithersburg, Md.
    • Federal Information Processing Standards Publication, "Secure Hash Standard," FIPS 180-1, Nat'l Inst. of Standards and Technology, Gaithersburg, Md., 1995.
    • (1995) Secure Hash Standard
  • 14
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash functions for message authentication
    • Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying Hash Functions for Message Authentication," in Proc. Advances in Cryptography - CRYPTO 96, Vol. 1109, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1996.
    • (1996) Proc. Advances in Cryptography - CRYPTO 96 , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 15
    • 0030086382 scopus 로고    scopus 로고
    • Role-base access control models
    • Feb.
    • R.S. Sandhu et al., "Role-Base Access Control Models," Computer, Vol. 29, No. 2, Feb. 1996, pp. 38-47.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.