-
8
-
-
0003593599
-
-
September RFC 2693
-
Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylonen. SPKI Certificate Theory, September 1999. RFC 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
12
-
-
33744918476
-
Analysing security protocols
-
A. Abdallah, editor, formal Aspects of Security, Springer Verlag, to appear
-
Dieter Gollmann. Analysing security protocols. In A. Abdallah, editor, formal Aspects of Security, LNCS 2629. Springer Verlag, to appear.
-
LNCS
, vol.2629
-
-
Gollmann, D.1
-
14
-
-
18744370043
-
-
February Internet Draft, draft-ietf-ipsec-ikev2-rationale-00.txt
-
Dan Harkins, Charlie Kaufman, Tero Kivinen, Stephen Kent, and Radia Perlman. Design Rationale for IKEv2, February 2002. Internet Draft, draft-ietf-ipsec-ikev2-rationale-00.txt.
-
(2002)
Design Rationale for IKEv2
-
-
Harkins, D.1
Kaufman, C.2
Kivinen, T.3
Kent, S.4
Perlman, R.5
-
17
-
-
0345241830
-
-
Addison Wesley Professional
-
Brian LaMacchia, Sebastian Lange, Matthew Lyons, Rudi Martin, and Kevin Price. .NET Framework Security. Addison Wesley Professional, 2002.
-
(2002)
NET Framework Security
-
-
LaMacchia, B.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.5
-
18
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
19
-
-
84958752287
-
Towards a survivable security architecture for ad-hoc networks
-
B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, Springer Verlag
-
Silja Mäki and Tuomas Aura. Towards a survivable security architecture for ad-hoc networks. In B. Christiansen et al., editor, Security Protocols, 9th International Workshop, Cambridge, LNCS 2467, pages 63-73. Springer Verlag, 2002.
-
(2002)
LNCS
, vol.2467
, pp. 63-73
-
-
Mäki, S.1
Aura, T.2
-
21
-
-
84944878354
-
-
CRC Press, Boca Raton, FA
-
Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FA, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
22
-
-
84947242748
-
Keynote address: The changing environment (transcript of discussion)
-
B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, Springer Verlag
-
Roger Needham. Keynote address: The changing environment (transcript of discussion). In B. Christiansen et al., editor, Security Protocols, 7th International Workshop, Cambridge, LNCS 1796, pages 1-5. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1796
, pp. 1-5
-
-
Needham, R.1
-
24
-
-
84944062148
-
How much details and negotiations can users handle?
-
F. Cuppens et al., editor, ESORICS 2000, Springer Verlag
-
Kai Rannenberg. How much details and negotiations can users handle? In F. Cuppens et al., editor, ESORICS 2000, LNCS 1895, pages 37-54. Springer Verlag, 2000.
-
(2000)
LNCS
, vol.1895
, pp. 37-54
-
-
Rannenberg, K.1
-
25
-
-
1942433797
-
DRM {and, or, vs.} the Law
-
April
-
Pamela Samuelson. DRM {and, or, vs.} the Law. Communications of the ACM, 46(4):41-45, April 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
28
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
June
-
Jianying Zhou. Fixing a security flaw in IKE protocols. Electronics Letters, 35(13):1072-1073, June 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.13
, pp. 1072-1073
-
-
Zhou, J.1
|