-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi. On SDSI's linked local name spaces. J. Computer Security, 1998.
-
(1998)
J. Computer Security
-
-
Abadi, M.1
-
4
-
-
1942420162
-
A trustworthy proof checker
-
A. W. Appel, N. Michael, A. Stump, and R. Virga. A trustworthy proof checker. J. Automated Reasoning, 31 (3-4):231-260, 2003.
-
(2003)
J. Automated Reasoning
, vol.31
, Issue.3-4
, pp. 231-260
-
-
Appel, A.W.1
Michael, N.2
Stump, A.3
Virga, R.4
-
6
-
-
33645960798
-
Device-enabled authorization in the Grey system
-
Computer Science Department, Carnegie Mellon University, Feb.
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. Technical Report CMU-CS-05-111, Computer Science Department, Carnegie Mellon University, Feb. 2005.
-
(2005)
Technical Report
, vol.CMU-CS-05-111
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
11
-
-
0003180840
-
A formulation of the simple theory of types
-
A. Church. A formulation of the simple theory of types. J. Symbolic Logic, 1940.
-
(1940)
J. Symbolic Logic
-
-
Church, A.1
-
12
-
-
0001610169
-
An algorithm for testing conversion in type theory
-
G. Huet and G. Plotkin, editors
-
T. Coquand. An algorithm for testing conversion in type theory. In G. Huet and G. Plotkin, editors, Logical Frameworks, pages 255-280. 1991.
-
(1991)
Logical Frameworks
, pp. 255-280
-
-
Coquand, T.1
-
13
-
-
0344842369
-
TRIP: A low-cost vision-based location system for ubiquitous computing
-
D. L. de Ipiña, P. Mendonça, and A. Hopper. TRIP: a low-cost vision-based location system for ubiquitous computing. Pers. and Ubiq. Comp., 6(3), 2002.
-
(2002)
Pers. and Ubiq. Comp.
, vol.6
, Issue.3
-
-
De Ipiña, D.L.1
Mendonça, P.2
Hopper, A.3
-
15
-
-
0003358457
-
SPKI certificate theory
-
Sept.
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. RFC 2693, Sept. 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
19
-
-
0027353175
-
A framework for defining logics
-
Jan.
-
R. Harper, F. Honsell, and G. Plotkin. A framework for defining logics. J. ACM, 40(1):143-184, Jan. 1993.
-
(1993)
J. ACM
, vol.40
, Issue.1
, pp. 143-184
-
-
Harper, R.1
Honsell, F.2
Plotkin, G.3
-
20
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov.
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Trans. Comp. Sys., 10(4):265-310, Nov. 1992.
-
(1992)
ACM Trans. Comp. Sys.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
21
-
-
27544481812
-
-
Personal communication
-
R. Levin. PGP snowflake. Personal communication, 1996.
-
(1996)
PGP Snowflake
-
-
Levin, R.1
-
25
-
-
21644484073
-
Secure/multipurpose internet mail extensions (S/MIME) version 3.1: Message specification
-
July
-
B. Ramsdell. Secure/multipurpose internet mail extensions (S/MIME) version 3.1: Message specification. RFC 3850, July 2004.
-
(2004)
RFC
, vol.3850
-
-
Ramsdell, B.1
-
27
-
-
0012408597
-
SDSI - A simple distributed security infrastructure
-
Apr.
-
R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure. Presented at CRYPTO '96 Rumpsession, Apr. 1996.
-
(1996)
CRYPTO '96 Rumpsession
-
-
Rivest, R.L.1
Lampson, B.2
-
28
-
-
19944391466
-
Using camera-equipped mobile phones for interacting with real-world objects
-
Apr.
-
M. Rohs and B. Gfeller. Using camera-equipped mobile phones for interacting with real-world objects. Advances in Pervasive Computing, pages 265-271, Apr. 2004.
-
(2004)
Advances in Pervasive Computing
, pp. 265-271
-
-
Rohs, M.1
Gfeller, B.2
-
29
-
-
19944413478
-
Using visual tags to bypass Bluetooth device discovery
-
Jan.
-
D. Scott, R. Sharp, A. Madhavapeddy, and E. Upton. Using visual tags to bypass Bluetooth device discovery. Mobile Comp. and Comm. Review, 1(2), Jan. 2005.
-
(2005)
Mobile Comp. and Comm. Review
, vol.1
, Issue.2
-
-
Scott, D.1
Sharp, R.2
Madhavapeddy, A.3
Upton, E.4
-
31
-
-
0028380781
-
Authentication in the Taos operating system
-
Feb.
-
E. Wobber, M. Abadi, M. Burrows, and B. Lampson. Authentication in the Taos operating system. ACM Trans. Comp. Sys., 12(1):3-32, Feb. 1994.
-
(1994)
ACM Trans. Comp. Sys.
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|