-
1
-
-
33845208188
-
Provably Secure Password-Based Authentication in TLS
-
M. Abdalla, E. Bresson, O. Chevassut, B. Moller, and D. Pointcheval. Provably Secure Password-Based Authentication in TLS. In ACM ASIACCS '06, pages 35-45, 2006.
-
(2006)
ACM ASIACCS '06
, pp. 35-45
-
-
Abdalla, M.1
Bresson, E.2
Chevassut, O.3
Moller, B.4
Pointcheval, D.5
-
3
-
-
85016749139
-
-
D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM Trans. Inter. Tech., 4(1):60-82, 2004.
-
D. Boneh, X. Ding, and G. Tsudik. Fine-grained control of security capabilities. ACM Trans. Inter. Tech., 4(1):60-82, 2004.
-
-
-
-
4
-
-
33745834380
-
Security on the US fusion grid
-
J. Burruss, T. Fredian, and M. Thompson. Security on the US fusion grid. In 5th IAEA TM on Control, Data Acquisition, and Remote Participation for Fusion Research, pages 1949-1955, 2006.
-
(2006)
5th IAEA TM on Control, Data Acquisition, and Remote Participation for Fusion Research
, pp. 1949-1955
-
-
Burruss, J.1
Fredian, T.2
Thompson, M.3
-
5
-
-
84948391696
-
A model of certificate revocation
-
D. Cooper. A model of certificate revocation. In IEEE 15th Annual ACSAC, pages 256-264, 1999.
-
(1999)
IEEE 15th Annual ACSAC
, pp. 256-264
-
-
Cooper, D.1
-
6
-
-
0033702950
-
-
D. Cooper. A More Efficient Use of Delta-CRLs. In IEEE Symposium on Security and Privacy, pages 199-202, 2000.
-
D. Cooper. A More Efficient Use of Delta-CRLs. In IEEE Symposium on Security and Privacy, pages 199-202, 2000.
-
-
-
-
7
-
-
21144456634
-
Certificate-Based Encryption and the Certificate Revocation Problem
-
C. Gentry. Certificate-Based Encryption and the Certificate Revocation Problem. Advances in Cryptology CEU-ROCRYPT,Springer, 2003.
-
(2003)
Advances in Cryptology CEU-ROCRYPT,Springer
-
-
Gentry, C.1
-
8
-
-
38049167090
-
Reflecting on X.509 and LDAP, or How Separating Identity and Attributes Could Simplify a PKI
-
J. Graff and O. Carvalho. Reflecting on X.509 and LDAP, or How Separating Identity and Attributes Could Simplify a PKI. In WSEG2004, 2004.
-
(2004)
WSEG2004
-
-
Graff, J.1
Carvalho, O.2
-
10
-
-
35148822789
-
-
International Telecommunication Union. ITU-T Recommendation X.509, Information technology - open systems interconnection - The directory: authentication framework, 1997.
-
International Telecommunication Union. ITU-T Recommendation X.509, Information technology - open systems interconnection - The directory: authentication framework, 1997.
-
-
-
-
12
-
-
0036352143
-
Fractal hash sequence representation and traversal
-
M. Iakobsson. Fractal hash sequence representation and traversal. In IEEE ISTT'02, pages 437-444, 2002.
-
(2002)
IEEE ISTT'02
, pp. 437-444
-
-
Iakobsson, M.1
-
13
-
-
84958063551
-
On certificate revocation and validation
-
P. Kocher. On certificate revocation and validation. Financial Cryptography, Springer-Verlag, 1465:172-177, 1998.
-
(1998)
Financial Cryptography, Springer-Verlag
, vol.1465
, pp. 172-177
-
-
Kocher, P.1
-
14
-
-
33646262102
-
PKI past, present and future
-
A. Lioy, M. Marian, N. Moltchanova, and M. Pala. PKI past, present and future. International Journal of Information Security, Springer Berlin, pages 18-29, 2006.
-
(2006)
International Journal of Information Security, Springer Berlin
, pp. 18-29
-
-
Lioy, A.1
Marian, M.2
Moltchanova, N.3
Pala, M.4
-
16
-
-
24944532382
-
NOVOMODO: Scable Certificate Validation And Simplified PKI Management
-
S. Micali. NOVOMODO: Scable Certificate Validation And Simplified PKI Management. In 1st Annual PKI Research Workshop, 2002.
-
(2002)
1st Annual PKI Research Workshop
-
-
Micali, S.1
-
17
-
-
3042593306
-
Public Key Infrastructures that Satisfy Security Goals
-
W. T. Polk, N. E. Hastings, and A. Malpani. Public Key Infrastructures that Satisfy Security Goals. IEEE Internet Computing, 7(4):60-67, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.4
, pp. 60-67
-
-
Polk, W.T.1
Hastings, N.E.2
Malpani, A.3
-
18
-
-
0037250920
-
Grids, the teragrid and beyond
-
D. Reed. Grids, the teragrid and beyond. IEEE Computer, 36(1):62-68, 2003.
-
(2003)
IEEE Computer
, vol.36
, Issue.1
, pp. 62-68
-
-
Reed, D.1
-
19
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
A. Shamir. Identity-Based Cryptosystems and Signature Schemes. Crypto 1984, Springer-Verlag, pages 47-53, 1985.
-
(1985)
Crypto 1984, Springer-Verlag
, pp. 47-53
-
-
Shamir, A.1
-
21
-
-
0004001001
-
-
RFC3820
-
S. Tuecke, V. Welch, D. Engert, L. Perlman, and M. Thompson. RFC3820: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile, 2004.
-
(2004)
Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Perlman, L.4
Thompson, M.5
-
22
-
-
4944261591
-
X.509 Proxy Certificates for Dynamic Delegation
-
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder, and F. Siebenlist. X.509 Proxy Certificates for Dynamic Delegation. In 3rd Annual PKI R&D Workshop, 2004.
-
(2004)
3rd Annual PKI R&D Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
-
23
-
-
33645797144
-
Tradeoffs in certificate revocation schemes
-
P. Zheng. Tradeoffs in certificate revocation schemes. ACM SIGCOMM Comput. Commun. Rev., 33(2):103-112, 2003.
-
(2003)
ACM SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.2
, pp. 103-112
-
-
Zheng, P.1
|