-
1
-
-
0003515463
-
-
Prentice Hall, Englewood Cliffs, N.J.
-
R. Ahuja, T. Magnanti, and J. Orlin. Network flows : theory, algorithms, and applications. Prentice Hall, Englewood Cliffs, N.J., 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.1
Magnanti, T.2
Orlin, J.3
-
4
-
-
0345872645
-
Trust and security: A new look at the byzantine generals problem
-
Proceedings of the DIMACS Workshop on Network Threats, American Mathematical Society Publications, December
-
M. Burmester, Y. Desmedt, and G. A. Kabatianski. Trust and security: A new look at the byzantine generals problem. In Proceedings of the DIMACS Workshop on Network Threats, volume 38 of DIMACS. American Mathematical Society Publications, December 1996.
-
(1996)
DIMACS
, vol.38
-
-
Burmester, M.1
Desmedt, Y.2
Kabatianski, G.A.3
-
5
-
-
4544304744
-
The sybil attack
-
MIT Faculty Club, Cambridge, MA, USA, March
-
John R. Douceur. The sybil attack. In Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), MIT Faculty Club, Cambridge, MA, USA, March 2002.
-
(2002)
Proceedings for the 1st International Workshop on Peer-to-Peer Systems (IPTPS '02)
-
-
Douceur, J.R.1
-
6
-
-
0003618065
-
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. RFC 2693: SPKI certificate theory, September 1999.
-
(1999)
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
35048881408
-
-
Technical Report TR-2003-19, Department of Computer Science, N.C. State University, October
-
Qinglin Jiang, Douglas S. Reeves, and Peng Ning. Improving robustness of PGP keyrings by conflict detection. Technical Report TR-2003-19, Department of Computer Science, N.C. State University, October 2003.
-
(2003)
Improving Robustness of PGP Keyrings by Conflict Detection
-
-
Jiang, Q.1
Reeves, D.S.2
Ning, P.3
-
9
-
-
0036783876
-
The consensus operator for combining beliefs
-
Audun Josang. The consensus operator for combining beliefs. Artificial Intelligence, 141(1):157-170, 2002.
-
(2002)
Artificial Intelligence
, vol.141
, Issue.1
, pp. 157-170
-
-
Josang, A.1
-
10
-
-
0002835397
-
On syntactic versus computational views of approximability
-
Sanjeev Khanna, Rajeev Motwani, Madhu Sudan, and Umesh V. Vazirani. On syntactic versus computational views of approximability. In IEEE Symposium on Foundations of Computer Science, pages 819-830, 1994.
-
(1994)
IEEE Symposium on Foundations of Computer Science
, pp. 819-830
-
-
Khanna, S.1
Motwani, R.2
Sudan, M.3
Vazirani, U.V.4
-
12
-
-
0003547516
-
-
Technical Report BU-CS-TR-2001-003, Boston University
-
Alberto Medina, Anukool Lakhina, Ibrahim Matta, and John Byers. BRITE: Universal topology generation from a user's perspective. Technical Report BU-CS-TR-2001-003, Boston University, 2001.
-
(2001)
BRITE: Universal Topology Generation from a User's Perspective
-
-
Medina, A.1
Lakhina, A.2
Matta, I.3
Byers, J.4
-
13
-
-
84969363097
-
A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model
-
San Diego, CA , USA, Feb
-
S. Mendes and C. Huitema. A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In Proceedings of the Symposium on Network and Distributed System Security, 1995, pages 172-189, San Diego, CA , USA, Feb 1995.
-
(1995)
Proceedings of the Symposium on Network and Distributed System Security, 1995
, pp. 172-189
-
-
Mendes, S.1
Huitema, C.2
-
14
-
-
84944878354
-
-
CRC Press, Boca Raton, Fla.
-
A. Menezes, P. Van Oorschot, and S. Vanstone. Handbook of applied cryptography. CRC Press, Boca Raton, Fla., 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
16
-
-
0032290722
-
Resilient authentication using path independence
-
December
-
M. Reiter and S. Stubblebine. Resilient authentication using path independence. IEEE Transactions on Computers, 47(12), December 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.12
-
-
Reiter, M.1
Stubblebine, S.2
-
18
-
-
0242621248
-
Associating metrics to certification paths
-
Yves Deswarte, Gérard Eizenberg, and Jean-Jacques Quisquater, editors, Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, Springer Verlag
-
Anas Tarah and Christian Huitema. Associating metrics to certification paths. In Yves Deswarte, Gérard Eizenberg, and Jean-Jacques Quisquater, editors, Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, volume 648 of Lecture Notes in Computer Science, pages 175-189. Springer Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.648
, pp. 175-189
-
-
Tarah, A.1
Huitema, C.2
|