메뉴 건너뛰기




Volumn , Issue , 2002, Pages 1-11

Zero-interaction authentication

Author keywords

Cryptographic file systems; Mobile computing; Stackable file systems; Transient authentication

Indexed keywords

CRYPTOGRAPHY; DATA STORAGE EQUIPMENT; LAPTOP COMPUTERS; SECURITY OF DATA; TELECOMMUNICATION LINKS;

EID: 0036949148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/570646.570647     Document Type: Conference Paper
Times cited : (141)

References (33)
  • 2
    • 85084163095 scopus 로고
    • Key management in an encrypting file system
    • Boston, MA, June
    • M. Blaze. Key management in an encrypting file system. In Proceedings of the Summer 1994 USENIX Conference, pages 27-35, Boston, MA, June 1994.
    • (1994) Proceedings of the Summer 1994 USENIX Conference , pp. 27-35
    • Blaze, M.1
  • 6
    • 0028533131 scopus 로고
    • BITS: A smartcard protected operating system
    • P. C. Clark and L. J. Hoffman BITS: A Smartcard protected operating system. Communications of the ACM, 37(11):66-70, 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 66-70
    • Clark, P.C.1    Hoffman, L.J.2
  • 7
    • 0004143352 scopus 로고
    • Cipher and hash function design: Strategies based on linear and differential cryptanalysis
    • PhD thesis, Katholieke Universiteit Leuven, March
    • J. Daemen. Cipher and hash function design: strategies based on linear and differential cryptanalysis. PhD thesis, Katholieke Universiteit Leuven, March 1995.
    • (1995)
    • Daemen, J.1
  • 10
    • 85177168023 scopus 로고    scopus 로고
    • Ensure Technologies
    • Ensure Technologies. http://www.ensureteh.com/.
  • 11
    • 0028374136 scopus 로고
    • File-system development with stackable layers
    • February
    • J. S. Heidman and G. J. Popek. File-system development with stackable layers. ACM Transactions on Computer Systems, 12(1):58-89, February 1994.
    • (1994) ACM Transactions on Computer Systems , vol.12 , Issue.1 , pp. 58-89
    • Heidman, J.S.1    Popek, G.J.2
  • 13
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks
    • Technical report, Rice University Department of Computer Science, June
    • Y. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical report, Rice University Department of Computer Science, June 2002.
    • (2002)
    • Hu, Y.1    Perrig, A.2    Johnson, D.B.3
  • 15
    • 0002024821 scopus 로고
    • Vnodes: An architecture for multiple file system types in Sun UNIX
    • Atlanta, GA, June
    • S. R. Kleiman. Vnodes: An architecture for multiple file system types in Sun UNIX. In USENIX Association Summer Conference Proceedings, pages 238-47, Atlanta, GA, June 1986.
    • (1986) USENIX Association Summer Conference Proceedings , pp. 238-247
    • Kleiman, S.R.1
  • 19
    • 4244084593 scopus 로고    scopus 로고
    • Encrypting file system for windows 2000
    • Microsoft Corporation
    • Microsoft Corporation. Encrypting File System for Windows 2000 http://www.microsoft.com/windows2000/techinfo/howitworks/security/encrypt.asp.
  • 21
    • 85177198628 scopus 로고
    • National Institute of Standards and Technology. Computer data authentication. FIPS Publication #113, May
    • National Institute of Standards and Technology. Computer data authentication. FIPS Publication #113, May 1985.
    • (1985)
  • 22
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-9, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 25
    • 0033888070 scopus 로고    scopus 로고
    • An introduction to evaluating biometric systems
    • February
    • P. J. Philips, A. Martin, C. L. Wilson, and M. Przybocki. An introduction to evaluating biometric systems. IEEE Computer, 33(2):56-63, February 2000.
    • (2000) IEEE Computer , vol.33 , Issue.2 , pp. 56-63
    • Philips, P.J.1    Martin, A.2    Wilson, C.L.3    Przybocki, M.4
  • 28
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • August
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-80, August 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 29
    • 84953635000 scopus 로고
    • Description of a new variable-length key, 64-bit block cipher (Blowfish)
    • Spring-Verlag
    • B. Schneier. Description of a new variable-length key, 64-bit block cipher (Blowfish). In Fast Software Encryption, Lecture Notes in Computer Science, pages 191-204. Spring-Verlag, 1994.
    • (1994) Fast Software Encryption, Lecture Notes in Computer Science , pp. 191-204
    • Schneier, B.1
  • 32
    • 0012579128 scopus 로고    scopus 로고
    • Cryptfs: A stackable vnode level encryption file system
    • Technical Report CUCS-021-98, Computer Science Department, Columbia University
    • E. Zadok, I. Badulescu, and A. Shender. Cryptfs: A stackable vnode level encryption file system. Technical Report CUCS-021-98, Computer Science Department, Columbia University, 1998.
    • (1998)
    • Zadok, E.1    Badulescu, I.2    Shender, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.