-
1
-
-
0003969638
-
-
26 December (Supersedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)
-
DoD Trusted Computer System Evaluation Criteria, 26 December 1985 (Supersedes CSC-STD-001-83, dtd 15 Aug 83). (Orange Book)
-
(1985)
DoD Trusted Computer System Evaluation Criteria
-
-
-
3
-
-
33744464814
-
PGP user's guide
-
Cambridge
-
P. Zimmermann, "PGP User's Guide," MIT Press, Cambridge, 1994.
-
(1994)
MIT Press
-
-
Zimmermann, P.1
-
4
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
San Diego, CA
-
U. G. Wilhelm, S. Staamann, and L. Buttyan, "On the problem of trust in mobile agent systems," in IEEE Network and Distributed Systems Security Symposium 1998, pages 11-13, San Diego, CA.
-
IEEE Network and Distributed Systems Security Symposium 1998
, pp. 11-13
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyan, L.3
-
5
-
-
0027266208
-
Trust relationships in secure systems - A distributed authentication perspective
-
May
-
R. Yahalom, B. Klein, and T. Beth, "Trust relationships in secure systems - A distributed authentication perspective," in Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, pages 150-164, May 1993.
-
(1993)
Proc. of the 1993 IEEE Symposium on Research in Security and Privacy
, pp. 150-164
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
6
-
-
0027266208
-
Trust relationships in secure systems - A distributed authentication perspective
-
May
-
R. Yahalom, B. Klein, and T. Beth, "Trust relationships in secure systems - A distributed authentication perspective," in Proc. of the 1993 IEEE Symposium on Research in Security and Privacy, pages 150-164, May 1993.
-
(1993)
Proc. of the 1993 IEEE Symposium on Research in Security and Privacy
, pp. 150-164
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
7
-
-
26844544709
-
On the problem of trust in mobile agent systems
-
San Diego, CA
-
U. G. Wilhelm, S. Staamann, and L. Buttyan, "On the problem of trust in mobile agent systems," in IEEE Network and Distributed Systems Security Symposium 1998, pages 11-13, San Diego, CA.
-
IEEE Network and Distributed Systems Security Symposium 1998
, pp. 11-13
-
-
Wilhelm, U.G.1
Staamann, S.2
Buttyan, L.3
-
8
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer-Verlag
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," LNCS 1796, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1796
-
-
Stajano, F.1
Anderson, R.2
-
9
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
Lecture Notes in Computer Science
-
M. Tatebayashi, N. Matsuzaki, and D. B. J. Newman, "Key distribution protocol for digital mobile communication systems," in Advances in Cryptology-Crypto '89 Proceedings, Lecture Notes in Computer Science, vol. 435, 1989, pp. 324-334.
-
(1989)
Advances in Cryptology-crypto '89 Proceedings
, vol.435
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.J.3
-
10
-
-
0028532997
-
Cryptanalysis and protocol failure
-
Nov
-
G. J. Simmons, "Cryptanalysis and protocol failure," Communications of the ACM, 37(11), Nov 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
-
-
Simmons, G.J.1
-
11
-
-
84969354234
-
On key distribution and authentication in mobile radio networks
-
Lecture Notes in Computer Science
-
C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, "On key distribution and authentication in mobile radio networks," in Advances in Cryptology EuroCrypt '93, Lecture Notes in Computer Science, vol. 765, pp. 461-465, 1993.
-
(1993)
Advances in Cryptology EuroCrypt '93
, vol.765
, pp. 461-465
-
-
Park, C.1
Kurosawa, K.2
Okamoto, T.3
Tsujii, S.4
-
13
-
-
0027589399
-
Fully-fledged two-way public key authentication and key agreement for low-cost terminals
-
May 27
-
M. J. Beller and Y. Yacobi, "Fully-Fledged Two-Way Public Key Authentication and Key Agreement for Low-Cost Terminals," Proceedings of Electronic Letters, May 27, 1993, Vol. 29, No. 11, pp. 999-1000.
-
(1993)
Proceedings of Electronic Letters
, vol.29
, Issue.11
, pp. 999-1000
-
-
Beller, M.J.1
Yacobi, Y.2
-
14
-
-
84956854891
-
Key establishment protocols for secure mobile communications: A selective survey
-
Proceedings of ACISP'98
-
C. Boyd and A. Mathuria, "Key establishment protocols for secure mobile communications: A selective survey," in Proceedings of ACISP'98, Lecture Notes in Computer Science, vol. 1438, 1998, pp. 344-355.
-
(1998)
Lecture Notes in Computer Science
, vol.1438
, pp. 344-355
-
-
Boyd, C.1
Mathuria, A.2
-
17
-
-
85094635733
-
An architecture for a secure service discovery service
-
Seattle, WA USA, August
-
th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1999), pages 24-35, Seattle, WA USA, August 1999.
-
(1999)
th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM 1999)
, pp. 24-35
-
-
Czerwinski, S.E.1
Zhao, B.Y.2
Hodes, T.D.3
Joseph, A.D.4
Katz, R.H.5
-
19
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," in Wireless Networks Journal (WINE), September 2002.
-
(2002)
Wireless Networks Journal (WINE)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
|