-
1
-
-
8344261291
-
Measured performance of data transmission over cellular telephone networks
-
Department of Computer Science, Report C-1994,-53. University of Helsinki, Helsinki, Finland. November
-
Alanko, T., Kojo, M., Laamanen, H., Liljeberg, M., Moilanen, M., Raatikainen, K., 1994. Measured performance of data transmission over cellular telephone networks. Department of Computer Science, Report C-1994,-53. University of Helsinki, Helsinki, Finland. November.
-
(1994)
-
-
Alanko, T.1
Kojo, M.2
Laamanen, H.3
Liljeberg, M.4
Moilanen, M.5
Raatikainen, K.6
-
2
-
-
0032669778
-
Transport layer security: How much does it really cost?
-
New York, New York, March). IEEE Computer Society Press, Los Alamitos, Calif
-
Apostolopoulos, G., Peris, V., Saha, D., 1999. Transport layer security: How much does it really cost? In Proceedings of IEEE INFOCOM'99 (New York, New York, March). IEEE Computer Society Press, Los Alamitos, Calif., pp. 717-725.
-
(1999)
Proceedings of IEEE INFOCOM'99
, pp. 717-725
-
-
Apostolopoulos, G.1
Peris, V.2
Saha, D.3
-
3
-
-
0003588995
-
A survey of secure multi-domain distributed architectures
-
Faculty of Information Technology, Queensland University of Technology, Queensland, Australia
-
Ashely, P., Broom, B., 1997. A survey of secure multi-domain distributed architectures. Faculty of Information Technology, Queensland University of Technology, Queensland, Australia.
-
(1997)
-
-
Ashely, P.1
Broom, B.2
-
4
-
-
0003623495
-
Efficiency testing of ANSI C implementations of round 1 candidate algorithms for the advanced encryption standard
-
Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology
-
Bassham, L. E., 1999. Efficiency testing of ANSI C implementations of round 1 candidate algorithms for the advanced encryption standard. Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology.
-
(1999)
-
-
Bassham, L.E.1
-
5
-
-
84958972496
-
-
D. Gollman, ed. Lecture Notes in Computer Science Springer-Verlag, Cambridge, UK
-
Blaze, M., 1996.High-Bandwidth Encryption with Low-Bandwidth Smartcards. D. Gollman, ed. Lecture Notes in Computer Science, vol. 1039. Springer-Verlag, Cambridge, UK, 33-40.
-
(1996)
High-Bandwidth Encryption with Low-Bandwidth Smartcards.
, vol.1039
, pp. 33-40
-
-
Blaze, M.1
-
6
-
-
0003578905
-
-
Elsevier North Holland, Inc., New York, NY
-
Bruell, S. C., Balbo, G., 1980.Computational Algorithms for Closed Queueing Networks. Elsevier North Holland, Inc., New York, NY.
-
(1980)
Computational Algorithms for Closed Queueing Networks.
-
-
Bruell, S.C.1
Balbo, G.2
-
7
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R., 1990. A logic of authentication.ACM Trans. Comput. Syst. 8, 1, 18-36.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
0001429662
-
Exception handling and tolerance of software faults
-
M. R. LYU, ed. Wiley, Chichester, UK
-
Cristian, F., 1995. Exception handling and tolerance of software faults. In Software Fault Tolerance, M. R. LYU, ed. Wiley, Chichester, UK, 81-107.
-
(1995)
Software Fault Tolerance
, pp. 81-107
-
-
Cristian, F.1
-
9
-
-
0032645708
-
Performance evaluation of a new hybrid encryption protocol for authentication and key distribution
-
Red Sea, Egypt, July). IEEE Computer Society Press, Los Alamitos, Calif
-
El-Hadidi, M. T., Hegazi, N. H., Aslan, H. K., 1999. Performance evaluation of a new hybrid encryption protocol for authentication and key distribution. In Proceedings of the 4th IEEE International Symposium on Computers and Communications (Red Sea, Egypt, July). IEEE Computer Society Press, Los Alamitos, Calif.
-
(1999)
Proceedings of the 4th IEEE International Symposium on Computers and Communications
-
-
El-Hadidi, M.T.1
Hegazi, N.H.2
Aslan, H.K.3
-
10
-
-
0030415891
-
Security on the move: Indirect authentication using Kerberos
-
Rye, New York, Nov.). ACM, New York
-
Fox, A., Gribble, S. D., 1996. Security on the move: Indirect authentication using Kerberos. In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking (Rye, New York, Nov.). ACM, New York, 155-163.
-
(1996)
Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking
, pp. 155-163
-
-
Fox, A.1
Gribble, S.D.2
-
12
-
-
0034823294
-
Performance of public key-enabled Kerberos authentication in large networks
-
Oakland, Calif., May). IEEE Computer Society, Los Alamitos, Calif.
-
Harbitter, A., Menasce, D. A., 2001a. Performance of public key-enabled Kerberos authentication in large networks. In Proceedings of 2001 IEEE Symposium on Security and Privacy (Oakland, Calif., May). IEEE Computer Society, Los Alamitos, Calif., 170-183.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security and Privacy
, pp. 170-183
-
-
Harbitter, A.1
Menasce, D.A.2
-
13
-
-
0035750946
-
The performance of public key-enabled Kerberos authentication in mobile computing applications
-
Philadelphia, Penn., Nov.). ACM New York
-
Harbitter, A., Menasce, D. A., 2001b. The performance of public key-enabled Kerberos authentication in mobile computing applications. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS-8) (Philadelphia, Penn., Nov.). ACM New York, 78-85.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS-8
, pp. 78-85
-
-
Harbitter, A.1
Menasce, D.A.2
-
14
-
-
0033154262
-
W. effect considered harmful, 4K Associates
-
July-Aug.
-
Khare,R. 1999. W. effect considered harmful, 4K Associates. IEEE Internet Comput (July-Aug.), 89-92.
-
(1999)
IEEE Internet Comput
, pp. 89-92
-
-
Khare, R.1
-
15
-
-
0032154399
-
Elliptic curve cryptography delivers high performance and security for e-commerce
-
Lambert, P., 1998. Elliptic curve cryptography delivers high performance and security for e-commerce.Comput. Sec. J. XIV, 4, 23-29.
-
(1998)
Comput. Sec. J. XIV
, vol.4
, pp. 23-29
-
-
Lambert, P.1
-
16
-
-
0030368007
-
Mowgli WWW software: Improved usability of WWW in mobile WAN environments
-
Westminster, London, England, Nov.), IEEE Computer Society Press, Los Alamitos, Calif.
-
Liljebeg, M., Helin, H., Kojo, M., Raatikainen, K., 1996. Mowgli WWW software: Improved usability of WWW in mobile WAN environments. In Proceedings of IEEE GLOBECOM '96 (Westminster, London, England, Nov.), IEEE Computer Society Press, Los Alamitos, Calif., 33-37.
-
(1996)
Proceedings of IEEE GLOBECOM '96
, pp. 33-37
-
-
Liljebeg, M.1
Helin, H.2
Kojo, M.3
Raatikainen, K.4
-
17
-
-
85028849727
-
A performance study of DCE 1.0.1 cell directory service: Implications for application and tool programmers
-
International Workshop OSF DCE, Karlsruhe, Germany, Oct
-
Martinka, J. J., Friedrich, R. J., Friedenbach, P. M., Sienknecht, T. F., 1993. A performance study of DCE 1.0.1 cell directory service: Implications for application and tool programmers.Networked Systems Architecture, Hewlett-Packard. International Workshop OSF DCE, Karlsruhe, Germany, Oct.
-
(1993)
Networked Systems Architecture, Hewlett-Packard.
-
-
Martinka, J.J.1
Friedrich, R.J.2
Friedenbach, P.M.3
Sienknecht, T.F.4
-
18
-
-
0004135392
-
Public key utilizing tickets for application servers (PKTAPP
-
Medvinsky, A., Hur, M., Neuman, C., 1997. Public key utilizing tickets for application servers (PKTAPP). www.ietf.org,http://www.ietf.org/internet-drafts/draft-ietf-cat-kerberos-pk-tapp-03.txt.
-
(1997)
-
-
Medvinsky, A.1
Hur, M.2
Neuman, C.3
-
19
-
-
0003811672
-
-
Prentice-Hall, Upper Saddle River, N.J
-
Menasce, D. A., Almeida, V. A. F., 2000.Scaling for E-Business: Technologies, Models, Performance, and Capacity Planning. Prentice-Hall, Upper Saddle River, N.J.
-
(2000)
Scaling for E-Business: Technologies, Models, Performance, and Capacity Planning.
-
-
Menasce, D.A.1
Almeida, V.A.F.2
-
20
-
-
0004176587
-
-
Prentice-Hall, Upper Saddle River, N.J
-
Menasce, D. A., Almeida, V. A. F., 2002.Capacity Planning for Web Services: Metrics, Models, and Methods. Prentice-Hall, Upper Saddle River, N.J.
-
(2002)
Capacity Planning for Web Services: Metrics, Models, and Methods.
-
-
Menasce, D.A.1
Almeida, V.A.F.2
-
22
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R. M., Schroeder, M. D., 1978. Using encryption for authentication in large networks of computers.Commun. ACM 21, 993-999.
-
(1978)
Commun. ACM
, vol.21
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
23
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
Neuman, B., Ts'O, T., 1994. Kerberos: An authentication service for computer networks.IEEE Commun. Magazine 32, 9, 33-38.
-
(1994)
IEEE Commun. Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Ts'O, T.2
-
24
-
-
85024272581
-
Performance evaluation of the IS-41 security mechanisms in a PCS supporting intelligent network services
-
Bordeaux, France, May). IEEE Computer Society Press, Los Alamitos, Calif.
-
Orozco-Barbosa, L., Serrano, L., Quiroz, E., 1998. Performance evaluation of the IS-41 security mechanisms in a PCS supporting intelligent network services. In Proceedings of IEEE IN'98 Workshop (Bordeaux, France, May). IEEE Computer Society Press, Los Alamitos, Calif., 142-154.
-
(1998)
Proceedings of IEEE IN'98 Workshop
, pp. 142-154
-
-
Orozco-Barbosa, L.1
Serrano, L.2
Quiroz, E.3
-
25
-
-
0010224357
-
A survey of mean value analysis, its generalizations, and applications, for networks of queues
-
William I. Simon Graduate School of Business Administration, University of Rochester, Rochester, N.Y.
-
Schweitzer, P. J., 1991. A survey of mean value analysis, its generalizations, and applications, for networks of queues. William I. Simon Graduate School of Business Administration, University of Rochester, Rochester, N.Y.
-
(1991)
-
-
Schweitzer, P.J.1
-
26
-
-
0030643360
-
Distributed authentication in Kerberos using public key cryptography
-
San Diego, Calif., Feb.), IEEE Computer Society Press, Los Alamitos, Calif
-
Sibbu, M. A., Chuang, J.C.-I., 1997. Distributed authentication in Kerberos using public key cryptography. In Proceedings of Symposium on Network and Distributed System Security (San Diego, Calif., Feb.), IEEE Computer Society Press, Los Alamitos, Calif.
-
(1997)
Proceedings of Symposium on Network and Distributed System Security
-
-
Sibbu, M.A.1
Chuang, J.C.-I.2
-
27
-
-
0003623968
-
Kerberos keeps the enterprise secure
-
Stallings, W., 1994. Kerberos keeps the enterprise secure. In Data Communications, 103-111.
-
(1994)
Data Communications
, pp. 103-111
-
-
Stallings, W.1
-
28
-
-
0003428414
-
-
Addison-Wesley, Reading, Mass
-
Stevens, W. R., 1999.TCP/IP Illustrated, vol. 1. Addison-Wesley, Reading, Mass.
-
(1999)
TCP/IP Illustrated
, vol.1
-
-
Stevens, W.R.1
-
29
-
-
85024277532
-
Initial and padd through authentication using Kerberos V5 and the GSS-API (IAKERB
-
Swift, M., Trostle, J., Aboba, B., Zorn, G., 2001. Initial and padd through authentication using Kerberos V5 and the GSS-API (IAKERB), IETF.
-
(2001)
IETF
-
-
Swift, M.1
Trostle, J.2
Aboba, B.3
Zorn, G.4
-
30
-
-
0003735736
-
Public key cryptography for cross-realm authentication in Kerberos
-
Tung, B., Ryutov, T., Neuman, C., Tsudik, G., Sommerfield, W., Medvinsky, A., Hub, M., 1998. Public key cryptography for cross-realm authentication in Kerberos.
-
(1998)
-
-
Tung, B.1
Ryutov, T.2
Neuman, C.3
Tsudik, G.4
Sommerfield, W.5
Medvinsky, A.6
Hub, M.7
-
31
-
-
0003735746
-
Public key cryptography for initial authentication in Kerberos
-
Tung, B., Neuman, C., Hub, M., Medvinsky, A., Medvinsky, S., Wray, J., Trostle, J., 2001. Public key cryptography for initial authentication in Kerberos.
-
(2001)
-
-
Tung, B.1
Neuman, C.2
Hub, M.3
Medvinsky, A.4
Medvinsky, S.5
Wray, J.6
Trostle, J.7
-
32
-
-
0033154297
-
Internet protocol performance over networks with wireless links
-
Xylomenos, G., Polyzos, G. C., 1999. Internet protocol performance over networks with wireless links.IEEENetw. 13, 4, 55-63.
-
(1999)
IEEENetw.
, vol.13
, Issue.4
, pp. 55-63
-
-
Xylomenos, G.1
Polyzos, G.C.2
-
33
-
-
0033344463
-
A general purpose proxy filtering mechanism applied to the mobile environment
-
Zenel, B., 1999. A general purpose proxy filtering mechanism applied to the mobile environment. Wireless Netw. 5, 391-409.
-
(1999)
Wireless Netw.
, vol.5
, pp. 391-409
-
-
Zenel, B.1
-
34
-
-
2442608984
-
Security versus performance requirements in data communications systems. D. Gollman, ed
-
Brighton, U.K., Nov.
-
Zorkadis, V., 1994. Security versus performance requirements in data communications systems. D. Gollman, ed. In Proceedings of Computer Security-ESORICS 94 (Brighton, U.K., Nov.) 19-30.
-
(1994)
Proceedings of Computer Security-ESORICS
, vol.94
, pp. 19-30
-
-
Zorkadis, V.1
|