-
2
-
-
84947251443
-
The resurrecting duckling: Security issues in ad-hoc wireless networks
-
Springer-Verlag, Berlin
-
F. Stajano and R.J. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks," Proc. Seventh Security Protocols Workshop, Lecture Notes in Computer Science 1796, Springer-Verlag, Berlin, 2000, pp. 172-182.
-
(2000)
Proc. Seventh Security Protocols Workshop, Lecture Notes in Computer Science 1796
, pp. 172-182
-
-
Stajano, F.1
Anderson, R.J.2
-
3
-
-
84957018842
-
Low cost attacks on tamper resistant devices
-
Proc. Fifth Security Protocols Workshop, Springer-Verlag, Berlin
-
R.J. Anderson and M.G. Kuhn, "Low Cost Attacks on Tamper Resistant Devices," Proc. Fifth Security Protocols Workshop, Lecture Notes in Computer Science 1361, Springer-Verlag, Berlin, 1998, pp. 125-136.
-
(1998)
Lecture Notes in Computer Science
, vol.1361
, pp. 125-136
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
4
-
-
84949953635
-
The resurrecting duckling-what next?
-
Proc. Eighth Security Protocols Workshop, Springer-Verlag, Berlin
-
F. Stajano, "The Resurrecting Duckling-What Next?" Proc. Eighth Security Protocols Workshop, Lecture Notes in Computer Science 2133, Springer-Verlag, Berlin, 2001, pp. 204-214.
-
(2001)
Lecture Notes in Computer Science
, vol.2133
, pp. 204-214
-
-
Stajano, F.1
-
5
-
-
0029700344
-
Decentralized trust management
-
IEEE CS Press, Los Alamitos, Calif.
-
M, Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. 17th IEEE Symp. Security and Privacy, IEEE CS Press, Los Alamitos, Calif., 1996, pp. 164-173.
-
(1996)
Proc. 17th IEEE Symp. Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
8
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Reston, Va.
-
A. Perrig et al., "Efficient and Secure Source Authentication for Multicast," Proc. Network and Distributed System Security Symp., Internet Society, Reston, Va., 2001; www.isoc.org/isoc/conferences/ndss/01/2001/INDEX.HTM.
-
(2001)
Proc. Network and Distributed System Security Symp.
-
-
Perrig, A.1
-
9
-
-
0002380073
-
Tamper resistance - A cautionary note
-
Usenix Assn., Berkeley, Calif.
-
R.J. Anderson and M.G. Kuhn, "Tamper Resistance-A Cautionary Note," Proc. Second Usenix Workshop on Electronic Commerce, Usenix Assn., Berkeley, Calif., 1996, pp. 1-11.
-
(1996)
Proc. Second Usenix Workshop on Electronic Commerce
, pp. 1-11
-
-
Anderson, R.J.1
Kuhn, M.G.2
-
10
-
-
85084163160
-
Compliance defects in public-key cryptography
-
Usenix Assn., Berkeley, Calif.
-
D. Davis, "Compliance Defects in Public-Key Cryptography," Proc. Sixth Usenix Security Symp., Usenix Assn., Berkeley, Calif., 1996, pp. 171-178.
-
(1996)
Proc. Sixth Usenix Security Symp.
, pp. 171-178
-
-
Davis, D.1
-
12
-
-
0003204888
-
The visible problems of the invisible computer: A skeptical look at information appliances
-
Sept.
-
A. Odlyzko, "The Visible Problems of the Invisible Computer: A Skeptical Look at Information Appliances," First Monday, vol. 4, no. 9, Sept. 1999; www.firstmonday.dk/issues/issue4_9/odlyzko/index.html.
-
(1999)
First Monday
, vol.4
, Issue.9
-
-
Odlyzko, A.1
|