-
1
-
-
0013142808
-
People, places, things: Web presence for the real world
-
Tim Kindberg, John Barton, Jeff Morgan, Gene Becker, Ilja Bedner, Debbie Caswell, Phillipe Debaty, Gita Gopal, Marcos Frid, Venky Krishnan, Howard Morris, Celine Pering, John Schettino, Bill Serra. People, Places, Things: Web Presence for the Real World, in Proceedings of WMCSA2000.
-
Proceedings of WMCSA2000
-
-
Kindberg, T.1
Barton, J.2
Morgan, J.3
Becker, G.4
Bedner, I.5
Caswell, D.6
Debaty, P.7
Gopal, G.8
Frid, M.9
Krishnan, V.10
Morris, H.11
Pering, C.12
Schettino, J.13
Serra, B.14
-
2
-
-
0003700417
-
Section E.2.1: Kerberos authentication and authorization system
-
Project Athena Technical Plan, MIT Project Athena, Cambridge, Massachusetts, October; (Version 4)
-
S.P. Miller, B. C. Neuman, J. I. Schiller, and J.H. Saltzer. Section E.2.1: Kerberos Authentication and Authorization System. Project Athena Technical Plan, MIT Project Athena, Cambridge, Massachusetts, October 1988. (Version 4)
-
(1988)
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
3
-
-
0003899818
-
The kerberos network authentication service (Version 5)
-
Internet Request for Comments RFC-1510. September
-
John Kohl and B. Clifford Neuman. The Kerberos Network Authentication Service (Version 5). Internet Request for Comments RFC-1510. September 1993.
-
(1993)
-
-
Kohl, J.1
Clifford Neuman, B.2
-
4
-
-
0020118361
-
Grapevine: An exercise in distributed computing
-
April
-
Andrew D. Birrell, Roy Levin, Roger M. Needham, and Michael D. Schroeder. Grapevine: An exercise in distributed computing. Communications of the ACM, 25(4):260-274, April 1982.
-
(1982)
Communications of the ACM
, vol.25
, Issue.4
, pp. 260-274
-
-
Birrell, A.D.1
Levin, R.2
Needham, R.M.3
Schroeder, M.D.4
-
6
-
-
0242528816
-
Security extensions for DCE 1.1
-
OSF DCE RFC 19
-
S. B. Fairthorne, "Security Extensions for DCE 1.1", OSF DCE RFC 19.
-
-
-
Fairthorne, S.B.1
-
7
-
-
0242445261
-
SESAME V4 - Overview
-
Dec
-
T. Parker, and D. Pinkas, "SESAME V4 - Overview", Dec 1995 Available as http://www.esat.kuleuven.ac.be/cosic/sesame/doc-txt/overview.txt
-
(1995)
-
-
Parker, T.1
Pinkas, D.2
-
10
-
-
0242445262
-
DCE authorization services - Privilege server
-
OSF DCE Specifications
-
Joseph N. Pato, DCE Authorization Services - Privilege Server, OSF DCE Specifications, 1990.
-
(1990)
-
-
Pato, J.N.1
-
15
-
-
0027713594
-
A framework for distributed authorization
-
Fairfax, Virginia, November 3-5
-
T.Y.C. Woo and S.S. Lam. A framework for distributed authorization. In Proceedings of 1st ACM Conference on Computer and Communications Security, pages 112-118, Fairfax, Virginia, November 3-5, 1993.
-
(1993)
Proceedings of 1st ACM Conference on Computer and Communications Security
, pp. 112-118
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
19
-
-
85027123825
-
New protocols for third-party-based authentication and secure broadcast
-
Fairfax, Virginia, November
-
L. Gong. New Protocols for Third-Party-Based Authentication and Secure Broadcast, In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pp 176-183, Fairfax, Virginia, November 1994.
-
(1994)
Proceedings of the 2nd ACM Conference on Computer and Communications Security
, pp. 176-183
-
-
Gong, L.1
-
20
-
-
0003978251
-
Key management for multicast: Issues and architectures
-
RFC 2627, June
-
D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC 2627, June 1999.
-
(1999)
-
-
Wallner, D.1
Harder, E.2
Agee, R.3
-
21
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. Proc. IEEE INFOCOM'99.
-
Proc. IEEE INFOCOM'99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
23
-
-
0003557429
-
Key establishment in large dynamic groups using one-way function trees
-
Technical Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, MD, May
-
D.A. McGrew and A.T. Sherman. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. Technical Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, MD, May 1998.
-
(1998)
-
-
McGrew, D.A.1
Sherman, A.T.2
-
24
-
-
0031641387
-
Efficient security for large and dynamic multicast groups
-
IEEE Computer Society Press
-
G. Caronni, M. Waldvogal, D. Sun, and B. Plattner. Efficient Security for Large and Dynamic Multicast Groups. In Workshop on Enabling Technologies, WETICE 98. IEEE Computer Society Press, 1998.
-
(1998)
Workshop on Enabling Technologies, WETICE 98
-
-
Caronni, G.1
Waldvogal, M.2
Sun, D.3
Plattner, B.4
-
25
-
-
0000636954
-
The versaKey framework: Versatile group key management
-
August
-
M. Waldvogal, G. Caronni, D. Sun, N. Weiler, and B. Plattner. The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communication, 17(8):1614-1631, August 1999.
-
(1999)
IEEE Journal on Selected Areas in Communication
, vol.17
, Issue.8
, pp. 1614-1631
-
-
Waldvogal, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
27
-
-
84948984838
-
Space requirements for broadcast encryption
-
C. Blundo and A. Cresti. Space requirements for broadcast encryption. In Proc. EUROCRYPT'94, LNCS 950, pp 287-298, 1994.
-
(1994)
Proc. EUROCRYPT'94, LNCS 950
, pp. 287-298
-
-
Blundo, C.1
Cresti, A.2
-
28
-
-
0001720832
-
Generalized beimel-chor schemes for broadcast encryption and interactive key distribution
-
C. Blundo, L. A. Frota Mattos, and D.R. Stinson. Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution. Theoretical Computer Science, 200(1-2):313-334, 1998.
-
(1998)
Theoretical Computer Science
, vol.200
, Issue.1-2
, pp. 313-334
-
-
Blundo, C.1
Frota Mattos, L.A.2
Stinson, D.R.3
-
29
-
-
0005053804
-
Some new results on key distribution patterns and broadcast encryption
-
D.R. Stinson and T. van Trung. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography, 14(3):261-279, 1998.
-
(1998)
Designs, Codes and Cryptography
, vol.14
, Issue.3
, pp. 261-279
-
-
Stinson, D.R.1
Van Trung, T.2
-
30
-
-
84957696450
-
Combinatorial bounds for broadcast encryption
-
M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In Proc. EUROCRYPT'98, LNCS 1403, pp 512-526, 1998.
-
(1998)
Proc. EUROCRYPT'98, LNCS 1403
, pp. 512-526
-
-
Luby, M.1
Staddon, J.2
-
31
-
-
0031142511
-
Key derivation for network management applications
-
May/June
-
U. Blumenthal, N. C. Hien, and B. Wijnen. Key Derivation for Network Management Applications. IEEE Network Magezine, pp 26-29, May/June 1997.
-
(1997)
IEEE Network Magezine
, pp. 26-29
-
-
Blumenthal, U.1
Hien, N.C.2
Wijnen, B.3
-
32
-
-
0042854809
-
Secret sets and applications
-
15 January
-
R. Molva and G. Tsudik. Secret sets and applications. Information Processing Letters, 65(1):47-55, 15 January 1998.
-
(1998)
Information Processing Letters
, vol.65
, Issue.1
, pp. 47-55
-
-
Molva, R.1
Tsudik, G.2
|