-
2
-
-
84982994153
-
Distributed access-rights managements with delegations certificates
-
Tuomas Aura: Distributed Access-Rights Managements with Delegations Certificates. Secure Internet Programming 1999: 211-235.
-
(1999)
Secure Internet Programming
, pp. 211-235
-
-
Aura, T.1
-
3
-
-
84956868429
-
Fast access control decisions from delegation certificate databases
-
Tuomas Aura: Fast Access Control Decisions from Delegation Certificate Databases. ACISP 1998: 284-295.
-
(1998)
ACISP
, pp. 284-295
-
-
Aura, T.1
-
4
-
-
0031641091
-
On the structure of delegation networks
-
Tuomas Aura: On the Structure of Delegation Networks. CSFW 1998: 14-26.
-
(1998)
CSFW
, pp. 14-26
-
-
Aura, T.1
-
7
-
-
84958048748
-
Compliance checking in the PolicyMaker trust management system
-
Matt Blaze, Joan Feigenbaum, Martin Strauss: Compliance Checking in the PolicyMaker Trust Management System. Financial Cryptography 1998: 254-274.
-
(1998)
Financial Cryptography
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
8
-
-
84958235938
-
Trust management for IPsec
-
Matt Blaze, John Ioannidis, Angelos D. Keromytis: Trust management for IPsec. TISSEC 5(2): 95-118 (2002).
-
(2002)
TISSEC
, vol.5
, Issue.2
, pp. 95-118
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
9
-
-
84860939746
-
-
C. EllisonB, Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen. SPKI: http://www.ietf.org/rfc/rfc2693.txt.
-
SPKI
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
10
-
-
0033295882
-
The nature of a useable PKI
-
Carl M. Ellison: The nature of a useable PKI. Computer Networks 31(8): 823-830 (1999).
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 823-830
-
-
Ellison, C.M.1
-
11
-
-
0242332739
-
Small worlds in wireless networks
-
October
-
A. Helmy. Small worlds in wireless networks. IEEE communication letters, Vol.7, No 10, October 2003.
-
(2003)
IEEE Communication Letters
, vol.7
, Issue.10
-
-
Helmy, A.1
-
12
-
-
0032290722
-
Resilient authentication using path independence
-
December
-
M. Reiter and S. Stubblebine. Resilient authentication using path independence. IEEE Transactions on computers, Vol.47, No. 12, December 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.12
-
-
Reiter, M.1
Stubblebine, S.2
-
13
-
-
84944878224
-
Transitive signature schemes
-
S. Micali, R.L. Rivest: Transitive Signature Schemes, CT-RSA 2002: 236-243.
-
(2002)
CT-RSA
, pp. 236-243
-
-
Micali, S.1
Rivest, R.L.2
-
15
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, R. Rivest: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2): 281-308, 1988.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
17
-
-
17144421339
-
Pretty Good Privacy (PGP)
-
MIT, October
-
Phil Zimmermann. Pretty Good Privacy (PGP), PGP User's Guide, MIT, October, 1994.
-
(1994)
PGP User's Guide
-
-
Zimmermann, P.1
-
18
-
-
4644262856
-
New model on undirected transitive signatures
-
Huafei Zhu. New model on undirected transitive signatures. IEE Proceedings of Communication, 2004
-
(2004)
IEE Proceedings of Communication
-
-
Zhu, H.1
|