-
3
-
-
18144387404
-
Optimal dispersal of special certificate graphs
-
Dept. of Computer Sciences
-
_, "Optimal dispersal of special certificate graphs," Dept. of Computer Sciences, UT Austin, Tech. Rep. TR04-37, 2004.
-
(2004)
UT Austin, Tech. Rep.
, vol.TR04-37
-
-
-
4
-
-
0012408597
-
SDSI - A simple distributed security infrastructure
-
R. L. Rivest and B. Lampson, "SDSI - A simple distributed security infrastructure," Presented at CRYPTO '96 Rumpsession, 1996.
-
(1996)
CRYPTO '96 Rumpsession
-
-
Rivest, R.L.1
Lampson, B.2
-
5
-
-
0003610239
-
Internet X.509 public key infrastructure operational protocols - LDAPv2
-
S. Boeyen, T. Howes, and P. Richard, "Internet X.509 public key infrastructure operational protocols - LDAPv2," RFC 2559, 1999.
-
(1999)
RFC
, vol.2559
-
-
Boeyen, S.1
Howes, T.2
Richard, P.3
-
6
-
-
0003344055
-
X.509 Internet public key infrastructure online certificate status protocol - OCSP
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X.509 Internet public key infrastructure online certificate status protocol - OCSP," RFC 2560, 1999.
-
(1999)
RFC
, vol.2560
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
7
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
N. Li, W. H. Winsborough, and J. C. Mitchell, "Distributed credential chain discovery in trust management," Journal of Computer Security, vol. 11, no. 1, pp. 35-86, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
8
-
-
0036376894
-
DRBAC: Distributed role-based access control for dynamic coalition environments
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, "dRBAC: distributed role-based access control for dynamic coalition environments," in Proceedings of 22nd International Conference on Distributed Computing Systems (ICDCS '02), 2002, pp. 411-420.
-
(2002)
Proceedings of 22nd International Conference on Distributed Computing Systems (ICDCS '02)
, pp. 411-420
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
10
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
ACM Press
-
J.-P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing. ACM Press, 2001, pp. 146-155.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
11
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
S. Capkun, L. Buttyán, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, 2003.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
|