-
1
-
-
21044449695
-
Persistent authenticated dictionaries and their applications
-
Proc. Information Security Conference (ISC 2001), Springer-Verlag
-
A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia. Persistent authenticated dictionaries and their applications. In Proc. Information Security Conference (ISC 2001), volume 2200 of LNCS, pages 379-393. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2200
, pp. 379-393
-
-
Anagnostopoulos, A.1
Goodrich, M.T.2
Tamassia, R.3
-
2
-
-
0004078695
-
-
IETF RFC 2704, Sept.
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote trust-management system, version 2. IETF RFC 2704, Sept. 1999.
-
(1999)
The KeyNote Trust-management System, Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
5
-
-
0035748036
-
Flexible authentication of XML documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. Stubblebine. Flexible authentication of XML documents. In Proc. ACM Conference on Computer and Communications Security, 2001.
-
(2001)
Proc. ACM Conference on Computer and Communications Security
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.6
-
7
-
-
0003593599
-
-
IETF RFC 2693, Sept.
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. IETF RFC 2693, Sept. 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
0036376894
-
dRBAC: Distributed role-based access control for dynamic coalition environments
-
IEEE Computer Society, July
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed role-based access control for dynamic coalition environments. In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02). IEEE Computer Society, July 2002.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02)
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
10
-
-
84945279475
-
An efficient dynamic and distributed cryptographic accumulator
-
Proc. Int. Security Conference (ISC 2002), Springer-Verlag
-
M. T. Goodrich, R. Tamassia, and J. Hasic. An efficient dynamic and distributed cryptographic accumulator. In Proc. Int. Security Conference (ISC 2002), volume 2433 of LNCS, pages 372-388. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2433
, pp. 372-388
-
-
Goodrich, M.T.1
Tamassia, R.2
Hasic, J.3
-
11
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In Proc. 2001 DARPA Information Survivability Conference and Exposition, volume 2, pages 68-82, 2001.
-
(2001)
Proc. 2001 DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
12
-
-
35248831605
-
Authenticated data structures for graph and geometric searching
-
Proc. RSA Conference, Cryptographers Track (RSA-CT), Springer-Verlag
-
M. T. Goodrich, R. Tamassia, N. Triandopoulos, and R. Cohen. Authenticated data structures for graph and geometric searching. In Proc. RSA Conference, Cryptographers Track (RSA-CT), volume 2612 of LNCS, pages 295-313. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2612
, pp. 295-313
-
-
Goodrich, M.T.1
Tamassia, R.2
Triandopoulos, N.3
Cohen, R.4
-
14
-
-
84949191488
-
Nonmonotonicity, user interfaces, and risk assessment in certificate revocation
-
Proceedings of the 5th Internation Conference on Financial Cryptography (FC'01), Springer-Verlag
-
N. Li and J. Feigenbaum. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. In Proceedings of the 5th Internation Conference on Financial Cryptography (FC'01), volume 2339 of Lecture Notes in Computer Science, pages 166-177. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2339
, pp. 166-177
-
-
Li, N.1
Feigenbaum, J.2
-
16
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Feb.
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
17
-
-
84969346266
-
A certified digital signature
-
G. Brassard, editor, Proc. CRYPTO '89, Springer-Verlag
-
R. C. Merkle. A certified digital signature. In G. Brassard, editor, Proc. CRYPTO '89, volume 435 of LNCS, pages 218-238. Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
19
-
-
0345757359
-
COCA: A secure distributed online certification authority
-
Nov.
-
L. Zhou, F. B. Schneider, and R. van Renesse. COCA: A secure distributed online certification authority. ACM Transactions on Computer Systems (TOCS), 20(4):329-368, Nov. 2002.
-
(2002)
ACM Transactions on Computer Systems (TOCS)
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
|