-
1
-
-
33744998346
-
Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology
-
United States General Accounting Office report GAO-0l-277, February
-
"Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology", United States General Accounting Office report GAO-0l-277, February 2001.
-
(2001)
-
-
-
2
-
-
36949036427
-
Solution and Problems : (Why) It's a long Way to Interoperability
-
Jürgen Schwemmer, September
-
"Solution and Problems : (Why) It's a long Way to Interoperability", Jürgen Schwemmer , Datenschutz und Datensicherheit, No.9, 2001 (September 2001).
-
(2001)
Datenschutz und Datensicherheit
, Issue.9
, pp. 2001
-
-
-
3
-
-
36949035330
-
Prime-Time Player?
-
Leo Pluswich and Darren Hartman, March
-
"Prime-Time Player?", Leo Pluswich and Darren Hartman, Information Security Magazine, March 2001.
-
(2001)
Information Security Magazine
-
-
-
4
-
-
36949024429
-
PKI: An Insider View
-
Ben Rothke, October
-
"PKI: An Insider View", Ben Rothke, Information Security Magazine, October 2001.
-
(2001)
Information Security Magazine
-
-
-
5
-
-
0343701135
-
-
RFC 2440, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, November
-
"OpenPGP Message Format", RFC 2440, Jon Callas, Lutz Donnerhacke, Hal Finney, and Rodney Thayer, November 1998.
-
(1998)
OpenPGP Message Format
-
-
-
6
-
-
0003981627
-
-
RFC 2692, Carl Ellison, September
-
"SPKI Requirements", RFC 2692, Carl Ellison, September 1999.
-
(1999)
SPKI Requirements
-
-
-
7
-
-
0003593599
-
-
RFC 2693, Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen, September
-
"SPKI Certificate Theory", RFC 2693, Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylönen, September 1999.
-
(1999)
SPKI Certificate Theory
-
-
-
8
-
-
36949006461
-
PKI Account Authority Digital Signature Infrastructure
-
Anne Wheeler and Lynn Wheeler, draft-wheeler-ipki-aads-01.txt, 16 November
-
"PKI Account Authority Digital Signature Infrastructure", Anne Wheeler and Lynn Wheeler, draft-wheeler-ipki-aads-01.txt, 16 November 1998.
-
(1998)
-
-
-
11
-
-
36949023966
-
-
Identity-Based Cryptosystems and Signature Schemes, Adi Shamir, Proceedings of Crypto'84, Springer-Verlag Lecture Notes in Computer Science No.196, p.47.
-
"Identity-Based Cryptosystems and Signature Schemes", Adi Shamir, Proceedings of Crypto'84, Springer-Verlag Lecture Notes in Computer Science No.196, p.47.
-
-
-
-
12
-
-
84874324906
-
-
Identity-Based Encryption from the Weil Pairing, Dan Boneh and Matthew Franklin, Proceedings of Crypto 2001, Springer-Verlag Lecture Notes in Computer Science No.2139, p.213
-
"Identity-Based Encryption from the Weil Pairing", Dan Boneh and Matthew Franklin, Proceedings of Crypto 2001, Springer-Verlag Lecture Notes in Computer Science No.2139, p.213
-
-
-
-
13
-
-
36949017705
-
PKI Billion-Dollar Boondoggle?
-
February
-
"PKI Billion-Dollar Boondoggle?", Information Security Magazine, February 2004, p. 14.
-
(2004)
Information Security Magazine
, pp. 14
-
-
-
14
-
-
12844272841
-
-
In Search of Usable Security: Five Lessons from the Field, Dirk Balfanz, Glenn Durfee, Rebecca Grinter, and D.K. Smetters, IEEE Security and Privacy, 2, No.5 (September/October 2004), p.19.
-
"In Search of Usable Security: Five Lessons from the Field", Dirk Balfanz, Glenn Durfee, Rebecca Grinter, and D.K. Smetters, IEEE Security and Privacy, Vol.2, No.5 (September/October 2004), p.19.
-
-
-
-
17
-
-
36949002005
-
-
th International Workshop on Security Protocols (Protocols'04), Springer-Verlag Lecture Notes in Computer Science No.3957, April 2004, p.306.
-
th International Workshop on Security Protocols (Protocols'04), Springer-Verlag Lecture Notes in Computer Science No.3957, April 2004, p.306.
-
-
-
-
18
-
-
36949024428
-
-
Criteria for Evaluating AAA Protocols for Network Access, RFC 2989, Bernard Aboba, Pat Calhoun, Steven Glass, Tom Hiller, Peter McCann, Hajime Shiino, Glen Zorn, Gopal Dommety, Charles Perkins, Basavaraj Patil, David Mitton, Serge Manning, Mark Anthony Beadles, Pat Walsh, Xing Chen, Sanjeevan Sivalingham, Alan Hameed, Mark Munson, Stuart Jacobs, Byung-Keun Lim, Brent Hirschman, Raymond Hsu, Haeng Koo, Mark Lipford, Ed Campbell, Yingchun Xu, Shinichi Baba, and Eric Jaques, November 2000.
-
"Criteria for Evaluating AAA Protocols for Network Access", RFC 2989, Bernard Aboba, Pat Calhoun, Steven Glass, Tom Hiller, Peter McCann, Hajime Shiino, Glen Zorn, Gopal Dommety, Charles Perkins, Basavaraj Patil, David Mitton, Serge Manning, Mark Anthony Beadles, Pat Walsh, Xing Chen, Sanjeevan Sivalingham, Alan Hameed, Mark Munson, Stuart Jacobs, Byung-Keun Lim, Brent Hirschman, Raymond Hsu, Haeng Koo, Mark Lipford, Ed Campbell, Yingchun Xu, Shinichi Baba, and Eric Jaques, November 2000.
-
-
-
-
20
-
-
36949030674
-
-
Chord: A Scalable Peer-to Peer Lookup Protocol for Internet Applications, Ion Stoica, Robert Morris, David Liben-Nowell, David Karger, M.Frans Kaashoek, Frank Dabek, and Hari Balakrishnan, Proceedings of ACM SIGCOMM 2001, August 2001, p.149.
-
"Chord: A Scalable Peer-to Peer Lookup Protocol for Internet Applications", Ion Stoica, Robert Morris, David Liben-Nowell, David Karger, M.Frans Kaashoek, Frank Dabek, and Hari Balakrishnan, Proceedings of ACM SIGCOMM 2001, August 2001, p.149.
-
-
-
-
21
-
-
0017018484
-
New Directions in Cryptography
-
Whitfield Diffie and Martin Heliman, November
-
"New Directions in Cryptography", Whitfield Diffie and Martin Heliman, IEEE Transactions on Information Theory, Vol.22, No.6 (November 1976), p.644.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644
-
-
-
22
-
-
36949018667
-
-
Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer, Donald Davies and W.Price, John Wiley and Sons, 1984.
-
"Security for Computer Networks : An Introduction to Data Security in Teleprocessing and Electronic Funds Transfer", Donald Davies and W.Price, John Wiley and Sons, 1984.
-
-
-
-
23
-
-
36949012934
-
-
th International Information Security Workshop (ISW'01), Springer-Verlag Lecture Notes in Computer Science No.2200, October 2001, p.378.
-
th International Information Security Workshop (ISW'01), Springer-Verlag Lecture Notes in Computer Science No.2200, October 2001, p.378.
-
-
-
-
24
-
-
84882980040
-
Plug-and-Play PKI: A PKI Your Mother Can Use
-
Peter Gutmann, August
-
th USENIX Security Symposium, August 2003, p.45.
-
(2003)
th USENIX Security Symposium
, pp. 45
-
-
-
25
-
-
85084163781
-
Lessons Learned in Implementing and Deploying Crypto Software
-
Peter Gutmann, August
-
th Usenix Security Symposium, August 2002, p.315.
-
(2002)
th Usenix Security Symposium
, pp. 315
-
-
-
26
-
-
0021918813
-
What non-programmers know about programming: Natural language procedure specification
-
Kathleen Galotti and William. Ganong III, January
-
"What non-programmers know about programming: Natural language procedure specification", Kathleen Galotti and William. Ganong III, International Journal of Man-Machine Studies, Vol.22, No.1 (January 1985), p.1.
-
(1985)
International Journal of Man-Machine Studies
, vol.22
, Issue.1
, pp. 1
-
-
-
27
-
-
36949027300
-
-
Apropos: Re-Routed Packets, Tina Darmohray, ;login, 26, No.8 (December 2001), p.3.
-
"Apropos: Re-Routed Packets", Tina Darmohray, ;login, Vol.26, No.8 (December 2001), p.3.
-
-
-
-
28
-
-
36949031017
-
Extranet Directory Delivers Digital IDs for Millions of Customers
-
"Extranet Directory Delivers Digital IDs for Millions of Customers", http://wp.netscape.com/solutions/business/profiles/verisign. html.
-
-
-
-
29
-
-
33947408305
-
Replacing the Whois Protocol
-
Andrew Newton, July/August
-
"Replacing the Whois Protocol", Andrew Newton, IEEE Internet Computing, Vol.10, No.4 (July/August 2006), p.79.
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.4
, pp. 79
-
-
|