-
1
-
-
84892080802
-
DomainKeys Identified Mail (DKIM)
-
draft-allman-dkim-base-00 (July 9)
-
E. Allman, J. Callas, M. Delany, M. Libbey, J. Fenton, M. Thomas, "DomainKeys Identified Mail (DKIM), Internet Draft (work in progress), draft-allman-dkim-base-00 (July 9, 2005).
-
(2005)
Internet Draft (Work in Progress)
-
-
Allman, E.1
Callas, J.2
Delany, M.3
Libbey, M.4
Fenton, J.5
Thomas, M.6
-
3
-
-
19744380329
-
Spamming, phishing, authentication and privacy
-
Inside Risks, Dec.
-
S. Bellovin, "Spamming, Phishing, Authentication and Privacy", Inside Risks, C.ACM 47(12), Dec.2004.
-
(2004)
C.ACM
, vol.47
, Issue.12
-
-
Bellovin, S.1
-
6
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
D. Boneh, M. Franklin, "Identity-Based Encryption from the Weil Pairing", SIAM Journal on Computing 32(3), 586-615, 2003.
-
(2003)
SIAM Journal on Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
0027684663
-
Operating system protection through program evolution
-
1 Oct.
-
F. Cohen, "Operating System Protection Through Program Evolution", Computers and Security 12(6), 1 Oct. 1993, pp. 565-584.
-
(1993)
Computers and Security
, vol.12
, Issue.6
, pp. 565-584
-
-
Cohen, F.1
-
9
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Dept. Computer Science, Univ. of Auckland (July)
-
C. Collberg, C. Thomborson, D. Low, "A Taxonomy of Obfuscating Transformations", Tech. Rep. 148, Dept. Computer Science, Univ. of Auckland (July 1997).
-
(1997)
Tech. Rep.
, vol.148
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
10
-
-
51749091237
-
Domain-based email authentication using public-keys advertised in the DNS (DomainKeys)
-
draft-delany-domainkeys-base-03.txt (29 Sept.)
-
M. Delany, "Domain-based Email Authentication Using Public-Keys Advertised in the DNS (DomainKeys)", Internet Draft (work in progress), draft-delany-domainkeys-base-03.txt (29 Sept. 2005). See also: http://en.wikipedia.org/wiki/Domain-keys.
-
(2005)
Internet Draft (Work in Progress)
-
-
Delany, M.1
-
11
-
-
0028462933
-
Threshold cryptography
-
July-August
-
Y. Desmedt, "Threshold Cryptography", Euro. Trans. Telecom. 5(4) 449-457, July-August 1994.
-
(1994)
Euro. Trans. Telecom.
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
12
-
-
0030697765
-
Building diverse computer systems
-
IEEE Computer Society Press
-
S. Forrest, A. Somayaji, D. H. Ackley, "Building Diverse Computer Systems", pp. 67-72, Proc. 6th Workshop on Hot Topics in Operating Systems, IEEE Computer Society Press, 1997.
-
(1997)
Proc. 6th Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.H.3
-
13
-
-
51349153173
-
Maille authentication: A novel protocol for distributed authentication
-
Toulouse, France, Aug.
-
A. Fritz, J.-F. Paris, "Maille Authentication: A Novel Protocol for Distributed Authentication", Proc. 19th IFIP Information Security Conference (SEC 2004), Toulouse, France, Aug. 2004.
-
(2004)
Proc. 19th IFIP Information Security Conference (SEC 2004)
-
-
Fritz, A.1
Paris, J.-F.2
-
14
-
-
33745585254
-
Friederich Johann Buck: Arithmetic puzzles in cryptography
-
Oct.
-
J. von zur Gathen, "Friederich Johann Buck: Arithmetic Puzzles in Cryptography", Cryptologia, Oct. 2004.
-
(2004)
Cryptologia
-
-
Von Zur Gathen, J.1
-
16
-
-
33745709845
-
Addressing the problem of undetected signature key compromise
-
NDSS 1999, San Diego, California, The Internet Society
-
M. Just, P. van Oorschot "Addressing the Problem of Undetected Signature Key Compromise", Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, The Internet Society 1999.
-
(1999)
Proceedings of the Network and Distributed System Security Symposium
-
-
Just, M.1
Van Oorschot, P.2
-
17
-
-
33745631135
-
Tolerating penetrations and insider attacks by requiring independent corroboration
-
C. Kahn, "Tolerating Penetrations and Insider Attacks by Requiring Independent Corroboration", 1998 New Security Paradigms Workshop (NSPW'98).
-
1998 New Security Paradigms Workshop (NSPW'98).
-
-
Kahn, C.1
-
21
-
-
48349098931
-
Sender policy framework: Authorizing use of domains in MAIL FROM
-
draft-lentczner-spf-00 (Oct.)
-
M. Lentczner, M. Wong, "Sender Policy Framework: Authorizing Use of Domains in MAIL FROM", Internet Draft (work in progress), draft-lentczner-spf-00 (Oct. 2004). See also: http://en.wikipedia.org/wiki/ Sender-Policy-Framework.
-
(2004)
Internet Draft (Work in Progress)
-
-
Lentczner, M.1
Wong, M.2
-
23
-
-
0017959977
-
Secure communications over insecure channels
-
R. Merkle, "Secure Communications over Insecure Channels", C. ACM21 (1978), 294-299.
-
(1978)
C. ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.1
-
25
-
-
0032680807
-
Information hiding - A survey
-
July
-
F. Petitcolas, R.J. Anderson, M.G. Kuhn, "Information Hiding - A Survey", Proc. of the IEEE (Special Issue on Protection of Multimedia Content), vol.87 no.7 (July 1999), pp.1062-1078.
-
(1999)
Proc. of the IEEE (Special Issue on Protection of Multimedia Content)
, vol.87
, Issue.7
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.J.2
Kuhn, M.G.3
-
29
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Springer LNCS 1419
-
T. Sander, C.F. Tschudin, "Protecting Mobile Agents Against Malicious Hosts", pp. 44-60, Mobile Agents and Security, Springer LNCS 1419 (1998).
-
(1998)
Mobile Agents and Security
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
30
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes", Crypto'84 (LNCS 196), 47-53, 1985.
-
(1985)
Crypto'84 (LNCS)
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
33
-
-
33745584273
-
-
Trusted Computing Group, http://www.trustedcomputinggroup.org/home.
-
-
-
-
34
-
-
84892105785
-
Sender Policy Framework (SPF) for authorizing use of domains in E-MAIL, version 1
-
draft-schlitt-spf-classic-02 (June 6)
-
M. Wong, W. Schlitt, "Sender Policy Framework (SPF) for Authorizing Use of Domains in E-MAIL, version 1", Internet Draft (work in progress), draft-schlitt-spf-classic-02 (June 6, 2005).
-
(2005)
Internet Draft (Work in Progress)
-
-
Wong, M.1
Schlitt, W.2
|