-
1
-
-
0002863367
-
Valuation of trust in open networks
-
Nov.
-
T. Beth, M. Borcherding and B. Klien, "Valuation of Trust in Open Networks", European Symposium on Research in Computer Security, Brighton, pp. 3-18, Nov. 1994.
-
(1994)
European Symposium on Research in Computer Security, Brighton
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klien, B.3
-
2
-
-
84982899264
-
The role of trust management in distributed systems security
-
J. Vitek, C. Jensen, Ed., Springer-Verlag
-
M. Blaze, J. Feigenbaum, J. Ioannidis and A.D. Keromytis, "The Role of Trust Management in Distributed Systems Security", Secure Internet Programming, J. Vitek, C. Jensen, Ed., Springer-Verlag, pp. 185-210, 1999.
-
(1999)
Secure Internet Programming
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
3
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrows, M. Abadi and R.M. Needham, "A Logic of Authentication", ACM Transactions on Computer Systems, Vol.8, No. 1, pp. 18-36, Feb. 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
4
-
-
0010344835
-
Poblano - A distributed trust model for peer-to-peer networks
-
Sun white paper, 5/2002
-
R. Chen, "Poblano - A Distributed Trust Model for Peer-to-Peer Networks", Sun white paper, 5/2002.
-
-
-
Chen, R.1
-
5
-
-
84942244236
-
A tamper-resistant framework for unambiguous detection of attacks in user space using process monitors
-
March
-
R. Chinchani, S. Upadhyaya, "A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors", First IEEE International Workshop on Information Assurance, Darmstadt, pp. 25-36, March 2003.
-
(2003)
First IEEE International Workshop on Information Assurance, Darmstadt
, pp. 25-36
-
-
Chinchani, R.1
Upadhyaya, S.2
-
6
-
-
0028462933
-
Threshold cryptography
-
Y. Desmedt, "Threshold cryptography", European Transactions on Telecommunications, Vol. 5, No. 4, pp. 449-457, 1994.
-
(1994)
European Transactions on Telecommunications
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
8
-
-
0242621246
-
New combinatorial bounds for authentication codes and key predistribution schemes
-
K. Kurosawa, K. Okada, H. Saido and D. Stinson, "New combinatorial bounds for authentication codes and key predistribution schemes", Designs, Codes and Cryptography, Vol. 15, No. 1, pp. 87-100, 1998.
-
(1998)
Designs, Codes and Cryptography
, vol.15
, Issue.1
, pp. 87-100
-
-
Kurosawa, K.1
Okada, K.2
Saido, H.3
Stinson, D.4
-
11
-
-
0003547217
-
-
O'Reilly, 2nd edition
-
S. Oaks, "Java Security", O'Reilly, 2nd edition, 2001.
-
(2001)
Java Security
-
-
Oaks, S.1
-
13
-
-
0242621245
-
-
CRC Press
-
J. Seberry, C. Charnes, J. Pieprzyk and R. Safavi-Naini, "Crypto Topics And Applications II, Algorithms and Theory of Computation Handbook", CRC Press, 1999.
-
(1999)
Crypto Topics and Applications II, Algorithms and Theory of Computation Handbook
-
-
Seberry, J.1
Charnes, C.2
Pieprzyk, J.3
Safavi-Naini, R.4
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret", Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|