-
3
-
-
12844271596
-
A good defense: Safeguarding the network from within
-
1st Quarter
-
F. Gambino (2003, 1st Quarter). A good defense: safeguarding the network from within. Packet, 15 (1), 23-27.
-
(2003)
Packet
, vol.15
, Issue.1
, pp. 23-27
-
-
Gambino, F.1
-
5
-
-
1642363165
-
A framework for choosing your next generation authentication /authorization system
-
2002
-
M.D. Guel (2002). A Framework for Choosing Your Next Generation Authentication /Authorization System. Information Security Technical Report, 7 (1), 2002, 63-78.
-
(2002)
Information Security Technical Report
, vol.7
, Issue.1
, pp. 63-78
-
-
Guel, M.D.1
-
8
-
-
12844287614
-
Wireless takes off
-
Third Quarter
-
J. Wexler, (2003, Third Quarter). Wireless takes off. Packet, 15 (3), 30-33.
-
(2003)
Packet
, vol.15
, Issue.3
, pp. 30-33
-
-
Wexler, J.1
-
10
-
-
0032164492
-
Security for virtual private intranets
-
September
-
W. A. Arbaugh, J. R. Davin, D. J. Farber, & J. M. Smith, (1998, September). Security for virtual private intranets. IEEE Computer, 32 (9), 48-55.
-
(1998)
IEEE Computer
, vol.32
, Issue.9
, pp. 48-55
-
-
Arbaugh, W.A.1
Davin, J.R.2
Farber, D.J.3
Smith, J.M.4
-
11
-
-
0032676481
-
Enhanced privacy and authentication for the global system for mobile communications
-
C. Lee, M. Hwang & W. Yang (1999). Enhanced privacy and authentication for the global system for mobile communications. Wireless Networks 5 (1999) 231-243.
-
(1999)
Wireless Networks
, vol.5
, Issue.1999
, pp. 231-243
-
-
Lee, C.1
Hwang, M.2
Yang, W.3
-
12
-
-
0033879165
-
Biometrics: The future of identification
-
February 2000
-
S. Pankanti, R. M. Bolle, & A. Jain, (2000,). Biometrics: The future of identification. IEEE Computer, February 2000, 46-49.
-
(2000)
IEEE Computer
, pp. 46-49
-
-
Pankanti, S.1
Bolle, R.M.2
Jain, A.3
-
15
-
-
0028514601
-
Kerberos: An authentication service for computer networks. a USC/ISI technical report number ISI/RS-94-399
-
B. C. Neuman & T. Tso, (1994). Kerberos: An authentication service for computer networks. A USC/ISI Technical Report number ISI/RS-94-399. IEEE Communications, 32 (9), 33-38.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Tso, T.2
-
17
-
-
12844277408
-
A methodology for analyzing the performance of authentication protocols
-
November
-
A. Harbitter & D. Menascé (2002, November). A methodology for analyzing the performance of authentication protocols. ACM Transactions on Information and System Security, 5 (4), 458-491.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 458-491
-
-
Harbitter, A.1
Menascé, D.2
-
19
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December 1978
-
R. M. Needham & M. D. Schroeder (1978). Using encryption for authentication in large networks of computers. Communications of the ACM, 21 (12) December 1978, 992-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 992-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
20
-
-
0542400928
-
Techniques for authentication protocols and key distribution on wireless ATM networks
-
D. Patiyoot & J. Shepherd (1998). Techniques for authentication protocols and key distribution on wireless ATM networks. In Proceedings of ACM SIGOPS '98 - Operating Systems Review 32 (4), 25-32.
-
(1998)
Proceedings of ACM SIGOPS '98 - Operating Systems Review
, vol.32
, Issue.4
, pp. 25-32
-
-
Patiyoot, D.1
Shepherd, J.2
-
21
-
-
0003735746
-
-
B. Tung, C. Neuman, M. Hur, A. Medvinsky, S. Medvinsky, J. Wray & J. Trostle (2001). Public key cryptography for initial authentication in Kerberos. Available: http://www.ietf.org/proceedings/00dec/I-D/draft-ietf-cat-kerberos-pk-init-12.txt
-
(2001)
Public Key Cryptography for Initial Authentication in Kerberos
-
-
Tung, B.1
Neuman, C.2
Hur, M.3
Medvinsky, A.4
Medvinsky, S.5
Wray, J.6
Trostle, J.7
|