-
1
-
-
0043026142
-
-
M. Bartel, J. Boyer, B. Fox, B. LaMacchia, and E. Simon. XML-Signature Syntax and Processing, 2002.
-
(2002)
XML-signature Syntax and Processing
-
-
Bartel, M.1
Boyer, J.2
Fox, B.3
LaMacchia, B.4
Simon, E.5
-
6
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung. Proactive Secret Sharing Or: How to Cope with Perpetual Leakage. In Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pages 339-352. Springer-Verlag, 1995.
-
(1995)
Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
7
-
-
21644442546
-
PEACE: A policy-based establishment of ad-hoc communities
-
IEEE Computer Society, December
-
S.L. Keoh, E. Lupu, and M. Sloman. PEACE: A Policy-based Establishment of Ad-hoc Communities. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, USA. IEEE Computer Society, December 2004.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, USA
-
-
Keoh, S.L.1
Lupu, E.2
Sloman, M.3
-
8
-
-
33845475210
-
Robust membership management for adhoc groups
-
S. Mäki, T. Aura, and M. Hietalahti. Robust Membership Management for Adhoc Groups. In Proceedings of the 5th Nordic Workshop on Secure IT Systems (NORSEC 2000), Reykjavik, Iceland, 2000.
-
(2000)
Proceedings of the 5th Nordic Workshop on Secure IT Systems (NORSEC 2000), Reykjavik, Iceland
-
-
Mäki, S.1
Aura, T.2
Hietalahti, M.3
-
10
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Mobile Computing and Networking, pages 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
11
-
-
0012408597
-
SDSI - A simple distributed security infrastructure
-
R.L. Rivest and B. Lampson. SDSI - A Simple Distributed Security Infrastructure. Presented at CRYPTO'96 Rumpsession, 1996.
-
(1996)
CRYPTO'96 Rumpsession
-
-
Rivest, R.L.1
Lampson, B.2
-
12
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu and E.J. Coyne. Role-Based Access Control Models. IEEE Computer, 29(8):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.8
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
-
13
-
-
4544314577
-
Admission control in peer-to-peer: Design and performance evaluation
-
October
-
N. Saxena, G. Tsudik, and J.H. Yi. Admission Control in Peer-to-Peer: Design and Performance Evaluation. In Proceedings of the First ACM Workshop on Security of Ad-hoc and Sensor Networks (SASN), Fairfax, Virginia, USA., October 2003.
-
(2003)
Proceedings of the First ACM Workshop on Security of Ad-hoc and Sensor Networks (SASN), Fairfax, Virginia, USA
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
16
-
-
0033357103
-
Securing ad-hoc networks
-
November/December
-
L. Zhou and Z. J. Haas. Securing Ad-Hoc Networks. IEEE Network Magazine, 13(6), November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
|