-
1
-
-
33645689192
-
Certified Email with a Light On-line Trusted Third Party:Design and Implementation
-
May
-
M. Abadi, N. Glew, B. Horne, B. Pinkas, " Certified Email with a Light On-line Trusted Third Party:Design and Implementation", in proceedings of the 11th International World Wide Web Conference, May 2002.
-
(2002)
Proceedings of the 11th International World Wide Web Conference
-
-
Abadi, M.1
Glew, N.2
Horne, B.3
Pinkas, B.4
-
2
-
-
33750062015
-
Bankable Postage for Network Services
-
Mumbai, India, December
-
M. Abadi, A. Birrell, M. Burrows, F. Dabek, and T. Wobber, "Bankable Postage for Network Services", in Proceedings of the 8th Asian Computing Science Conference, Mumbai, India, December 2003.
-
(2003)
Proceedings of the 8th Asian Computing Science Conference
-
-
Abadi, M.1
Birrell, A.2
Burrows, M.3
Dabek, F.4
Wobber, T.5
-
3
-
-
0010689312
-
-
Carnegie Mellon Software Engineering Institute, Addison Wesley, Indianapolis. ISBN 0-2-1-73723-X
-
J. Allen, The CERT Guide to System and Network Security Practices, Carnegie Mellon Software Engineering Institute, Addison Wesley, Indianapolis, 2001. ISBN 0-2-1-73723-X.
-
(2001)
The CERT Guide to System and Network Security Practices
-
-
Allen, J.1
-
6
-
-
3042683432
-
Message authentication using hash functions: The HMAC construction
-
RSA Laboratories', Spring
-
M. Bellare, R. Canetti, and H. Krawczyk, "Message authentication using hash functions: The HMAC construction", RSA Laboratories' CryptoBytes, Vol. 2, No. 1, Spring 1996.
-
(1996)
CryptoBytes
, vol.2
, Issue.1
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
LNCS 1403, Springer-Verlag
-
M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography", in Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998.
-
(1998)
Eurocrypt'98
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
8
-
-
18944378473
-
Certified email: Design and implementation of a new optimistic protocol
-
June 30 - July 03, Turkey
-
C. Blundo, S. Cimato, and R. D. Prisco, "Certified Email: Design and Implementation of a New Optimistic Protocol", in proceedings of the Eighth IEEE International Symposium on Computers and Communications, June 30 - July 03, Turkey, 2003.
-
(2003)
Proceedings of the Eighth IEEE International Symposium on Computers and Communications
-
-
Blundo, C.1
Cimato, S.2
Prisco, R.D.3
-
10
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing", SIAM Journal of Computing, Vol. 32, No. 3, pp. 586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
14
-
-
24944587762
-
Simple identity-based cryptography with mediated RSA
-
Cryptographer's Track
-
X. Ding and G. Tsudik, "Simple Identity-Based Cryptography with Mediated RSA", in Proceedings of the RSA Conference, Cryptographer's Track, 2003.
-
(2003)
Proceedings of the RSA Conference
-
-
Ding, X.1
Tsudik, G.2
-
15
-
-
84943235829
-
Pricing via processing or combatting junk mail
-
C. Dwork, M. Naor, "Pricing via Processing or Combatting Junk Mail", in Proceedings of CRYPTO'92, 1993, pp. 137-147.
-
(1993)
Proceedings of CRYPTO'92
, pp. 137-147
-
-
Dwork, C.1
Naor, M.2
-
18
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on the discrete logarithm
-
T. E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm", IEEE Transactions of Information Theory, pages 31(4): 469-472, 1985.
-
(1985)
IEEE Transactions of Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Gamal, T.E.1
-
19
-
-
33644553604
-
-
The GNU Privacy Guard, http://gnupg.org.
-
-
-
-
23
-
-
33644514442
-
Privacy enhancement for internet electronic mail: Part I: Message encryption and authentication procedures
-
J. Linn, "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", IETF PEM WG RFC 21, 1993.
-
(1993)
IETF PEM WG RFC
, vol.21
-
-
Linn, J.1
-
24
-
-
33644509934
-
-
LISTSERV, http://www.lsoft.com.
-
LISTSERV
-
-
-
27
-
-
33644530501
-
-
Majordomo, http://www.greatcircle.com/majordomo.
-
Majordomo
-
-
-
28
-
-
0030687206
-
Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
-
M. Mambo and E. Okamoto, "Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts", IEICE Transactions on Fundamentals, vol. E80-A, No. 1, 1997.
-
(1997)
IEICE Transactions on Fundamentals
, vol.E80-A
, Issue.1
-
-
Mambo, M.1
Okamoto, E.2
-
29
-
-
0000961370
-
Iolus: A framework for scalable secure multicasting
-
S. Mittra, "Iolus: A Framework for Scalable Secure Multicasting", in proceedings of ACM SIGCOMM 1997.
-
(1997)
Proceedings of ACM SIGCOMM
-
-
Mittra, S.1
-
31
-
-
3042844664
-
Giving e-mail back to the users: Using digital signatures to solve the spam problem
-
September
-
T. Tompkins and D. Handley, "Giving e-mail back to the users: Using digital signatures to solve the spam problem", First Monday, 8(9), September 2003.
-
(2003)
First Monday
, vol.8
, Issue.9
-
-
Tompkins, T.1
Handley, D.2
-
32
-
-
33644503690
-
-
US Department of Energy Computer Incident Advisory, January 26 2000. http://ciac.llnl.gov/ciac/bulletins/k-020.shtml.
-
(2000)
-
-
-
33
-
-
0033893174
-
Secure group communications using key graphs
-
C. K. Wong, M. G. Gouda, S. S. Lam, "Secure group communications using key graphs", IEEE/ACM Transactions on Networking 8(1): 16-30, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
|