-
2
-
-
34047192001
-
"Optimal Dispersal of Certificate Chains"
-
Dept. of Computer Sciences, Univ. of Texas at Austin
-
E. Jung, E.S. Elmallah, and M.G. Gouda, "Optimal Dispersal of Certificate Chains," Technical Report TR06-14, Dept. of Computer Sciences, Univ. of Texas at Austin, 2006.
-
(2006)
Technical Report TR06-14
-
-
Jung, E.1
Elmallah, E.S.2
Gouda, M.G.3
-
4
-
-
0003608554
-
"Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2"
-
RFC 2559
-
S. Boeyen, T. Howes, and P. Richard, "Internet X.509 Public Key Infrastructure Operational Protocols - LDAPv2," RFC 2559, 1999.
-
(1999)
-
-
Boeyen, S.1
Howes, T.2
Richard, P.3
-
5
-
-
0004115865
-
"X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP"
-
RFC 2560
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP," RFC 2560, 1999.
-
(1999)
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
6
-
-
0003593599
-
"SPKI Certificate Theory"
-
RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "SPKI Certificate Theory," RFC 2693, 1999.
-
(1999)
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
7
-
-
0004078695
-
"The KeyNote Trust-Management System Version 2"
-
RFC 2704
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The KeyNote Trust-Management System Version 2," RFC 2704, 1999.
-
(1999)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
8
-
-
0035680371
-
"Certificate Chain Discovery in SPKI/SDSI"
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. Rivest, "Certificate Chain Discovery in SPKI/SDSI," J. Computer Security, vol. 9, no. 4, pp. 285-322, 2001.
-
(2001)
J. Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.6
-
9
-
-
85180773761
-
"Building Certificate Paths: Forward vs. Reverse"
-
Feb
-
Y. Elley, A. Anderson, S. Hanna, S. Mullan, R. Perlman, and S. Proctor, "Building Certificate Paths: Forward vs. Reverse," Proc. Network and Distributed System Security Symp. (NDSS '01), pp. 153-160, Feb. 2001.
-
(2001)
Proc. Network and Distributed System Security Symp. (NDSS '01)
, pp. 153-160
-
-
Elley, Y.1
Anderson, A.2
Hanna, S.3
Mullan, S.4
Perlman, R.5
Proctor, S.6
-
10
-
-
0036376894
-
"dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments"
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, "dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments," Proc. 22nd Int'l Conf. Distributed Computing Systems (ICDCS '02), pp. 411-420, 2002.
-
(2002)
Proc. 22nd Int'l Conf. Distributed Computing Systems (ICDCS '02)
, pp. 411-420
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
11
-
-
0037243196
-
"Distributed Credential Chain Discovery in Trust Management"
-
N. Li, W.H. Winsborough, and J.C. Mitchell, "Distributed Credential Chain Discovery in Trust Management," J. Computer Security, vol. 11, no. 1, pp. 35-86, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
12
-
-
0033357103
-
"Securing Ad Hoc Networks"
-
Nov.-Dec
-
L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24-30, Nov.-Dec. 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
13
-
-
0035704362
-
"Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks"
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks," Proc. Ninth Int'l Conf. Network Protocols (ICNP '01), pp. 251-260, 2001.
-
(2001)
Proc. Ninth Int'l Conf. Network Protocols (ICNP '01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
15
-
-
56849130276
-
"Vulnerability Analysis of Certificate Graphs"
-
M.G. Gouda and E. Jung, "Vulnerability Analysis of Certificate Graphs" Int'l J. Security and Networks, vol. 1, no. 1, 2006.
-
(2006)
Int'l J. Security and Networks
, vol.1
, Issue.1
-
-
Gouda, M.G.1
Jung, E.2
-
16
-
-
80055001335
-
"ConChord: Cooperative SDSI Certificate Storage and Name Resolution"
-
Mar
-
S. Ajmani, D.E. Clarke, C.-H. Moh, and S. Richman, "ConChord: Cooperative SDSI Certificate Storage and Name Resolution," Proc. Peer-to-Peer Systems: First Int'l Workshop (IPTPS '02), pp. 141-154, Mar. 2002.
-
(2002)
Proc. Peer-to-Peer Systems: First Int'l Workshop (IPTPS '02)
, pp. 141-154
-
-
Ajmani, S.1
Clarke, D.E.2
Moh, C.-H.3
Richman, S.4
-
17
-
-
0032290722
-
"Resilient Authentication Using Path Independence"
-
Dec
-
M.K. Reiter and S.G. Stubblebine, "Resilient Authentication Using Path Independence," IEEE Trans. Computers, vol. 47, no. 12, pp. 1351-1362, Dec. 1998.
-
(1998)
IEEE Trans. Computers
, vol.47
, Issue.12
, pp. 1351-1362
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
18
-
-
0035789229
-
"The Quest for Security in Mobile Ad Hoc Networks"
-
J.-P. Hubaux, L. Buttyán, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," Proc. 2001 ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 146-155, 2001.
-
(2001)
Proc. 2001 ACM Int'l Symp. Mobile Ad Hoc Networking and Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
19
-
-
0242678584
-
"Self-Organized Public-Key Management for Mobile Ad Hoc Networks"
-
Jan.-Mar
-
S. Capkun, L. Buttyán, and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
20
-
-
19644362259
-
"An Optimal Certificate Dispersal Algorithm for Mobile Ad Hoc Networks"
-
H. Zheng, S. Omura, J. Uchida,and K. Wada, "An Optimal Certificate Dispersal Algorithm for Mobile Ad Hoc Networks," Proc. Third Int'l Symp. Parallel and Distributed Computing/Third Int'l Workshop Algorithms, Models, and Tools for Parallel Computing on Heterogeneous Networks (ISPDC/HeteroPar '04), 2004.
-
(2004)
Proc. Third Int'l Symp. Parallel and Distributed Computing/Third Int'l Workshop Algorithms, Models, and Tools for Parallel Computing on Heterogeneous Networks (ISPDC/HeteroPar '04)
-
-
Zheng, H.1
Omura, S.2
Uchida, J.3
Wada, K.4
|