-
1
-
-
0004309520
-
Research in intrusion-detection systems: A Survey
-
Dept. of Comp. Eng., Chalmers, Univ. of Technology, Goteborg, Sweden
-
S. Axelsson. Research in Intrusion-Detection systems: A Survey, in Technical Report 98-17, Dept. of Comp. Eng., Chalmers, Univ. of Technology, Goteborg, Sweden, 1998, http://citeseer.ist.psu.edu/axelsson98research.html.
-
(1998)
Technical Report
, vol.98
, Issue.17
-
-
Axelsson, S.1
-
5
-
-
33646021971
-
Towards a theory of intrusion detection
-
vol. 3679 of LNCS, Springer-Verlag
-
G. Di Crescenzo, A. Ghosh, and R. Talpade. Towards a Theory of Intrusion Detection. In Proc. of European Symposium on Research in computer Security (ESORICS 2005), vol. 3679 of LNCS, pp. 267-286, Springer-Verlag.
-
Proc. of European Symposium on Research in Computer Security (ESORICS 2005)
, pp. 267-286
-
-
Di Crescenzo, G.1
Ghosh, A.2
Talpade, R.3
-
6
-
-
84945116168
-
On perfect and adaptive security in exposureresilient cryptography
-
vol. 2045 of LNCS, Springer-Verlag
-
Y. Dodis, A. Sahai, A. Smith. On Perfect and Adaptive Security in ExposureResilient Cryptography. In Proc. of EUROCRYPT 2001, vol. 2045 of LNCS, pp. 301-324. Springer-Verlag.
-
Proc. of EUROCRYPT 2001
, pp. 301-324
-
-
Dodis, Y.1
Sahai, A.2
Smith, A.3
-
7
-
-
33745597565
-
Password protocols provably secure in the bounded retrieval model
-
unpublished draft, April
-
Password Protocols provably secure in the Bounded Retrieval Model, first public version of this work, unpublished draft, April 2005.
-
(2005)
First Public Version of This Work
-
-
-
8
-
-
0003532271
-
UNIX password security - Ten years later
-
LNCS, no. 435, Springer-Verlag
-
D.C. Feldmeier and P.R. Karn. UNIX Password Security - Ten Years Later, in Proceedings of Crypto'89, LNCS, no. 435, Springer-Verlag, pp. 44-63
-
Proceedings of Crypto'89
, pp. 44-63
-
-
Feldmeier, D.C.1
Karn, P.R.2
-
10
-
-
33745581489
-
Authenticating secure tokens using slow memory access
-
USENIX Press
-
John Kelsey and Bruce Schneier. Authenticating Secure Tokens Using Slow Memory Access. USENIX Workshop on Smart Card Technology, USENIX Press, pp. 101-106, 1999.
-
(1999)
USENIX Workshop on Smart Card Technology
, pp. 101-106
-
-
Kelsey, J.1
Schneier, B.2
-
11
-
-
4344636292
-
Encryption against storage-bounded adversaries from on-line strong extractors
-
Chi-Jen Lu. Encryption against storage-bounded adversaries from on-line strong extractors. Journal of Cryptology, vol. 17, no. 1, pp. 27-42, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 27-42
-
-
Lu, C.-J.1
-
12
-
-
4344699394
-
Optimal randomizer efficiency in the bounded-storage model
-
Stefan Dziembowski and Ueli Maurer. Optimal Randomizer Efficiency in the Bounded-Storage Model, In Journal of Cryptology, vol. 17, no. 1, pp. 5-26.
-
Journal of Cryptology
, vol.17
, Issue.1
, pp. 5-26
-
-
Dziembowski, S.1
Maurer, U.2
-
13
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Ueli Maurer. Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher. Journal of Cryptology, vol. 5, no. 1, pp. 53-66, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.1
-
14
-
-
35048857905
-
Non-interactive timestamping in the bounded storage model
-
vol. 3152 of LNCS, Springer-Verlag
-
Tal Moran, Ronen Shaltiel, Amnon Ta-Shma. Non-interactive Timestamping in the Bounded Storage Model. In Proc. of CRYPTO 2004, vol. 3152 of LNCS, pp. 460-476. Springer-Verlag.
-
Proc. of CRYPTO 2004
, pp. 460-476
-
-
Moran, T.1
Shaltiel, R.2
Ta-Shma, A.3
-
15
-
-
0018543411
-
Password security: A case history
-
R. Morris and K. Thompson. Password Security: A Case History, in Communications of the ACM, Vol. 22, no. 11, 1979, pp. 594-597.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
16
-
-
0033075850
-
Extracting randomness: A survey and new constructions
-
February 26
-
N. Nisan and A. Ta-Shma. Extracting Randomness: A Survey and New Constructions, in Journal of Computer and System Sciences, February 1999, vol. 58, no. 1, pp. 148-173(26)
-
(1999)
Journal of Computer and System Sciences
, vol.58
, Issue.1
, pp. 148-173
-
-
Nisan, N.1
Ta-Shma, A.2
-
21
-
-
0036000527
-
Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors
-
Electronic Colloquium on Computational Complexity TR01-018; other versions
-
O. Reingold, S. Vadhan, and A. Wigderson. Entropy Waves, The Zig-Zag Graph Product, and New Constant-Degree Expanders and Extractors, in Electronic Colloquium on Computational Complexity TR01-018; other versions in Proceedings of FOCS 8000 and Annals of Mathematics, vol. 155, pp. 157-187, 2002.
-
(2002)
Proceedings of FOCS 8000 and Annals of Mathematics
, vol.155
, pp. 157-187
-
-
Reingold, O.1
Vadhan, S.2
Wigderson, A.3
-
22
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir. How to Share a Secret. Communications of the ACM, Volume 22, Issue 11 (November 1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
-
-
Shamir, A.1
-
23
-
-
0012579059
-
Recent developments in explicit constructions of extractors
-
R. Shaltiel. Recent developments in Explicit Constructions of Extractors. Bulletin of the EATCS, 77:67-95, 2002.
-
(2002)
Bulletin of the EATCS
, vol.77
, pp. 67-95
-
-
Shaltiel, R.1
-
25
-
-
4344628859
-
On constructing locally computable extractors and cryptosystems in the bounded storage model
-
S. P. Vadhan. On constructing locally computable extractors and cryptosystems in the bounded storage model. Journal of Cryptology, vol. 17, no. 1, pp. 43-77, 2004.
-
(2004)
Journal of Cryptology
, vol.17
, Issue.1
, pp. 43-77
-
-
Vadhan, S.P.1
-
26
-
-
33745616473
-
-
Proc. of the 1998 Internet Society Network and Distributed System Security Symposium 27
-
T. Wu, The secure remote password protocol, in Proc. of the 1998 Internet Society Network and Distributed System Security Symposium 27. http://money.cnn.com/2003/02/18/technology/creditcards/
-
The Secure Remote Password Protocol
-
-
Wu, T.1
-
27
-
-
33745634080
-
-
http://www.detnews.com/2005/technology/0506/18/tech-219662.htm
-
-
-
|