-
1
-
-
0003515463
-
-
Prentice Hall, Englewood Cliffs, N.J.
-
R. Ahuja, T. Magnanti, and J. Orlin. Network flows : theory, algorithms, and applications. Prentice Hall, Englewood Cliffs, N.J., 1993.
-
(1993)
Network Flows: Theory, Algorithms, and Applications
-
-
Ahuja, R.1
Magnanti, T.2
Orlin, J.3
-
2
-
-
0031641091
-
On the structure of delegation networks
-
Rockport, MA, June 1998. IEEE Computer Society Press
-
Tuomas Aura. On the structure of delegation networks. In Proc. 11th IEEE Computer Security Foundations Workshop, pages 14-26, Rockport, MA, June 1998. IEEE Computer Society Press.
-
Proc. 11th IEEE Computer Security Foundations Workshop
, pp. 14-26
-
-
Aura, T.1
-
3
-
-
20744437968
-
Pushdown-reduce: An algorithm for connectivity augmentation and poset covering problems
-
András A. Benczúr. Pushdown-reduce: an algorithm for connectivity augmentation and poset covering problems. Discrete Applied Mathematics, 129(2-3):233-262, 2003.
-
(2003)
Discrete Applied Mathematics
, vol.129
, Issue.2-3
, pp. 233-262
-
-
Benczúr, A.A.1
-
5
-
-
0029700344
-
Decentralized trust management
-
Oakland CA USA, 6-8 May
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland CA USA, 6-8 May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
8
-
-
0003618065
-
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. RFC 2693: SPKI certificate theory, September 1999.
-
(1999)
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
11
-
-
29444436479
-
Directed vertex-connectivity augmentation
-
Andras Frank and Tibor Jordan. Directed vertex-connectivity augmentation. Mathematical Programming, 84(3):537-553, 1999.
-
(1999)
Mathematical Programming
, vol.84
, Issue.3
, pp. 537-553
-
-
Frank, A.1
Jordan, T.2
-
12
-
-
0003780715
-
-
Addison-Wesley, Reading, Mass.
-
Frank Harary. Graph Theory. Addison-Wesley, Reading, Mass., 1969.
-
(1969)
Graph Theory
-
-
Harary, F.1
-
13
-
-
35048841438
-
Certificate recommendations to improve robustness of webs of trust
-
Department of Computer Science, N.C. State University, January
-
Qinglin Jiang, Douglas S. Reeves, and Peng Ning. Certificate recommendations to improve robustness of webs of trust. Technical Report TR-2004-04, Department of Computer Science, N.C. State University, January 2004.
-
(2004)
Technical Report TR-2004-04
-
-
Jiang, Q.1
Reeves, D.S.2
Ning, P.3
-
14
-
-
34248346949
-
Improving robustness of PGP by conflict detection
-
Springer
-
Qinglin Jiang, Douglas S. Reeves, and Peng Ning. Improving robustness of PGP by conflict detection. In The Cryptographers Track at the RSA Conference 2004, volume 2964 of Lecture Notes in Computer Science, pages 194-207. Springer, 2004.
-
(2004)
The Cryptographers Track at the RSA Conference 2004, Volume 2964 of Lecture Notes in Computer Science
, pp. 194-207
-
-
Jiang, Q.1
Reeves, D.S.2
Ning, P.3
-
18
-
-
84969363097
-
A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model
-
San Diego, CA , USA, Feb 1995.
-
S. Mendes and C. Huitema. A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In Proceedings of the Symposium on Network and Distributed System Security, 1995, pages 172-189, San Diego, CA , USA, Feb 1995.
-
(1995)
Proceedings of the Symposium on Network and Distributed System Security
, pp. 172-189
-
-
Mendes, S.1
Huitema, C.2
-
19
-
-
51249185617
-
The ellipsoid method and its consequences in combinatorial optimization
-
M.Grotschel, L.Lovasz, and A.Schrijver. The ellipsoid method and its consequences in combinatorial optimization. Combinatorial, 1:169 -197, 1981.
-
(1981)
Combinatorial
, vol.1
, pp. 169-197
-
-
Grotschel, M.1
Lovasz, L.2
Schrijver, A.3
-
20
-
-
84867958844
-
Graph connectivity and its augmentation: Applications of ma orderings
-
Hiroshi Nagamochi and Toshihide Ibaraki. Graph connectivity and its augmentation: applications of ma orderings. Discrete Appl. Math., 123(1-3):447-472, 2002.
-
(2002)
Discrete Appl. Math.
, vol.123
, Issue.1-3
, pp. 447-472
-
-
Nagamochi, H.1
Ibaraki, T.2
-
22
-
-
0032290722
-
Resilient authentication using path independence
-
December
-
M. Reiter and S. Stubblebine. Resilient authentication using path independence. IEEE Transactions on Computers, 47(12), December 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.12
-
-
Reiter, M.1
Stubblebine, S.2
-
24
-
-
0242621248
-
Associating metrics to certification paths
-
France, November 23-25, 1992, Proceedings, volume 648 of Lecture Notes in Computer Science, Springer Verlag
-
Anas Tarah and Christian Huitema. Associating metrics to certification paths. In Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, volume 648 of Lecture Notes in Computer Science, pages 175-189. Springer Verlag, 1992.
-
(1992)
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse
, pp. 175-189
-
-
Tarah, A.1
Huitema, C.2
-
25
-
-
35048899030
-
-
Int'l Telecommunications Union/ITU Telegraph & Tel. ITU-T recommendation X.509: The directory: Public-key and attribute certificate frameworks, Mar 2000.
-
Int'l Telecommunications Union/ITU Telegraph & Tel. ITU-T recommendation X.509: The directory: Public-key and attribute certificate frameworks, Mar 2000.
-
-
-
-
26
-
-
0032482432
-
Collective dynamics of small-world networks
-
D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, 393:440, 1998.
-
(1998)
Nature
, vol.393
, pp. 440
-
-
Watts, D.1
Strogatz, S.2
|