-
1
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92, 16-20 August 1992. Springer-Verlag
-
C. Dwork and M. Naor. "Pricing Via Processing or Combatting Junk Mail", In Ernest F. Brickell, editor, Advances in Cryptology - CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 139-147, 16-20 August 1992. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 139-147
-
-
Dwork, C.1
Naor, M.2
-
2
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen. "SPKI Certificate Theory", RFC 2693, September 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
3
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks
-
June
-
Y. C. Hu, D. B. Johnson, and A. Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", IEEE WMCSA 2002, June 2002.
-
(2002)
IEEE WMCSA 2002
-
-
Hu, Y.C.1
Johnson, D.B.2
Perrig, A.3
-
6
-
-
0003068282
-
Security architecture for the internet protocol
-
November
-
S. Kent and R. Atkinson. "Security Architecture for the Internet Protocol", RFC 2401, November 1998
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
7
-
-
0033743163
-
Secure Border Gateway Protocol (Secure-BGP)
-
April
-
S. Kent, C. Lynn, and K. Seo. "Secure Border Gateway Protocol (Secure-BGP)", IEEE Journal on Selected Areas in Communications, Vol. 18, No. 4, April 2000.
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, Issue.4
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
9
-
-
0003828107
-
-
Ph.D. Thesis, Department of Electrical Engineering and Computer Science, MIT, August
-
R. Perlman. "Network Layer Protocols with Byzantine Robustness", Ph.D. Thesis, Department of Electrical Engineering and Computer Science, MIT, August 1988.
-
(1988)
Network Layer Protocols with Byzantine Robustness
-
-
Perlman, R.1
-
10
-
-
0003973081
-
Interconnections: Bridges, routers, switches, and internetworking protocols
-
R. Perlman, "Interconnections: Bridges, Routers, Switches, and Internetworking Protocols", Addison- Wesley Professional Computing Series, Second edition, 1999.
-
(1999)
Addison- Wesley Professional Computing Series, Second Edition
-
-
Perlman, R.1
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir. "How to share a secret." Communications of the ACM, 22:612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, editor, LNCS, Springer-Verlag
-
P.F. Syverson, G. Tsudik, M. G. Reed, and C. E. Landwehr. "Towards an Analysis of Onion Routing Security". In H. Federrath, editor, Designing Privacy Enhancing Technologies, vol. 2009 of LNCS, pp. 96-114. Springer-Verlag, 2001.
-
(2001)
Designing Privacy Enhancing Technologies
, vol.2009
, pp. 96-114
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
|