-
1
-
-
48949107773
-
-
T. Dierks and C. Allen, The TLS Protocol, Version 1.0, IETF RFC 2246, 1999
-
T. Dierks and C. Allen, "The TLS Protocol, Version 1.0," IETF RFC 2246, 1999.
-
-
-
-
2
-
-
0003593599
-
SPKI Certificate Theory
-
IETF RFC 2693, Online, Available
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen, "SPKI Certificate Theory," IETF RFC 2693, 1998. [Online]. Available: http://www.ietf.org/rfc/rfc2693.txt
-
(1998)
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
3
-
-
48949107777
-
-
A. Freier, P. Karlton, and P. Kocher, The SSL Protocol, Version 3.0, Internet Draft, Available at, 1996
-
A. Freier, P. Karlton, and P. Kocher, "The SSL Protocol, Version 3.0," Internet Draft, Available at http://www.netscape.com/eng/ssl3, 1996.
-
-
-
-
4
-
-
0036376894
-
drbac: Distributed role-based access control for dynamic coalition environments
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, "drbac: Distributed role-based access control for dynamic coalition environments," in Proc. ICDCS, 2002.
-
(2002)
Proc. ICDCS
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
5
-
-
18744409344
-
The blocker tag: Selective blocking of rfid tags for consumer privacy
-
New York, NY, USA: ACM Press
-
A. Juels, R. L. Rivest, and M. Szydlo, "The blocker tag: selective blocking of rfid tags for consumer privacy," in CCS '03: Proceedings of the 10th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2003, pp. 103-111.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
6
-
-
33750949375
-
Privacy threats and issues in mobile RFID
-
IEEE
-
H. Lee and J. Kim, "Privacy threats and issues in mobile RFID," in Proc. ARES. IEEE, 2006.
-
(2006)
Proc. ARES
-
-
Lee, H.1
Kim, J.2
-
7
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, May
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Design of a role-based trust management framework," in Proc. 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 2002, pp. 114-130.
-
(2002)
Proc. 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
8
-
-
84870717915
-
-
Online, Available
-
Microsoft. Healthvault. [Online]. Available: http://www.healthvault.com
-
Microsoft. Healthvault
-
-
-
9
-
-
0004115865
-
X.509 Internet Public Key Infrastructure Online Certicate Status Protocol
-
IETF RFC 2560, Online, Available
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams, "X.509 Internet Public Key Infrastructure Online Certicate Status Protocol," IETF RFC 2560, 1996. [Online]. Available: http://www.ietf.org/rfc/rfc2560.txt
-
(1996)
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
10
-
-
0031541392
-
Flexible update propagation for weakly consistent replication
-
Saint Malo, France, Online, Available
-
K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J. Demers, "Flexible update propagation for weakly consistent replication," in Proceedings of the 16th ACM Symposium on Operating SystemsPrinciples (SOSP-16), Saint Malo, France, 1997. [Online]. Available: citeseer.ist.psu.edu/petersen97flexible.html
-
(1997)
Proceedings of the 16th ACM Symposium on Operating SystemsPrinciples (SOSP-16)
-
-
Petersen, K.1
Spreitzer, M.J.2
Terry, D.B.3
Theimer, M.M.4
Demers, A.J.5
-
11
-
-
0003614529
-
SDSI - A simple distributed security infrastructure
-
Online, Available
-
R. L. Rivest and B. Lampson, "SDSI - A simple distributed security infrastructure," in Proc. of CRYPTO'96, 1996. [Online]. Available: http://theory.lcs.mit.edu/cis/sdsi.html
-
(1996)
Proc. of CRYPTO'96
-
-
Rivest, R.L.1
Lampson, B.2
-
12
-
-
48949107775
-
-
Trusted Platform Alliance. (2007, August) Trusted platform module (tpm) specifications. [Online]. Available: https://www.trustedcomputinggroup.org/ specs/TPM/
-
Trusted Platform Alliance. (2007, August) Trusted platform module (tpm) specifications. [Online]. Available: https://www.trustedcomputinggroup.org/ specs/TPM/
-
-
-
-
13
-
-
0343762482
-
-
Available at, 2001
-
T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne, and S. Lehtinen, "SSH Protocol Architecture," Available at http://www.ssh.com/tech, 2001.
-
SSH Protocol Architecture
-
-
Ylonen, T.1
Kivinen, T.2
Saarinen, M.3
Rinne, T.4
Lehtinen, S.5
|