-
2
-
-
57749096981
-
-
Array Networks Inc. SSL VPN vs IPSec VPN, Jan. 2003. white paper.
-
Array Networks Inc. SSL VPN vs IPSec VPN, Jan. 2003. white paper.
-
-
-
-
3
-
-
26444464784
-
Policy-Based Cryptography and Applications
-
Springer Berlin, Heidelberg
-
W Bagga and R Molva, "Policy-Based Cryptography and Applications", In Lecture Notes in Computer Science, pp. 72-87, Springer Berlin / Heidelberg, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 72-87
-
-
Bagga, W.1
Molva, R.2
-
4
-
-
33751038485
-
The Final Nail in WEP's Coffin
-
SP, pp
-
A Bittau, M Handley, J Lackey, "The Final Nail in WEP's Coffin", The 2006 IEEE Symposium on Security and Privacy SP, pp. 386-400, 2006.
-
(2006)
The 2006 IEEE Symposium on Security and Privacy
, pp. 386-400
-
-
Bittau, A.1
Handley, M.2
Lackey, J.3
-
5
-
-
84874324906
-
Identity-Based Encryption from the Weil Pairing
-
Springer-Verlag
-
D Boneh and M Franklin, "Identity-Based Encryption from the Weil Pairing", In Proceedings of CRYPTO 2001, pages 213-229, Springer-Verlag, 2001.
-
(2001)
Proceedings of CRYPTO
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0002262722
-
Role-based access control (RBAC): Features and motivations
-
D Ferraiolo, J Cugini, R Kuhn, "Role-based access control (RBAC): Features and motivations", In Proceedings of the 11th Annual Conference on Computer Security Applications, pp 241-248, 1995.
-
(1995)
Proceedings of the 11th Annual Conference on Computer Security Applications
, pp. 241-248
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, R.3
-
7
-
-
1642394295
-
Hidden credentials
-
ACM Press
-
J Holt, R Bradshaw, KE Seamons, and H Orman, "Hidden credentials", In Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, ACM Press, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.E.3
Orman, H.4
-
8
-
-
0022114816
-
Message Authentication
-
RR Jueneman, SM Matyas, CH Meyer, "Message Authentication", IEEE Communications Magazine, pp 29-40, 1985.
-
(1985)
IEEE Communications Magazine
, pp. 29-40
-
-
Jueneman, R.R.1
Matyas, S.M.2
Meyer, C.H.3
-
10
-
-
7244238418
-
Virtual Private Networks: An Overview with Performance Evaluation
-
October
-
S Khanvilkar, A Khokhar, "Virtual Private Networks: An Overview with Performance Evaluation", IEEE Communications Magazine, pp 146-154, October 2004.
-
(2004)
IEEE Communications Magazine
, pp. 146-154
-
-
Khanvilkar, S.1
Khokhar, A.2
-
12
-
-
57749120349
-
-
Hewlett-Packard Laboratories, technical report HPL-2003-21
-
MC Mont, P Bramhall, CR Dalton, and K Harrison, "A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial", Hewlett-Packard Laboratories, technical report HPL-2003-21, 2003.
-
(2003)
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology in a Health Care Trial
-
-
Mont, M.C.1
Bramhall, P.2
Dalton, C.R.3
Harrison, K.4
-
13
-
-
57749092754
-
-
Motion Computing, Motion C5, 2007, http://www. motioncomputing.com/
-
Motion Computing, "Motion C5", 2007, http://www. motioncomputing.com/
-
-
-
-
14
-
-
57749106429
-
-
Personal Health Information Protection Act (PHIPA 2004) http://www.health.gov.on.ca/english/public/legislation/bill-31/personal-info. html
-
Personal Health Information Protection Act (PHIPA 2004) http://www.health.gov.on.ca/english/public/legislation/bill-31/personal-info. html
-
-
-
-
15
-
-
57749094685
-
-
Personal Information Protection and Electronic Documents Act (PIPEDA 2000) http://www.privcom.gc.ca/legislation/02-06-01-01-e.asp
-
Personal Information Protection and Electronic Documents Act (PIPEDA 2000) http://www.privcom.gc.ca/legislation/02-06-01-01-e.asp
-
-
-
-
16
-
-
67349246661
-
-
Secure Computing, 2007, http://www.securecomputing.com/
-
(2007)
Secure Computing
-
-
-
17
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Springer-Verlag New York, Inc
-
Shamir, "Identity-based cryptosystems and signature schemes", In Proceedings of CRYPTO 84 on Advances in cryptology, pp. 47-53. Springer-Verlag New York, Inc., 1985.
-
(1985)
Proceedings of CRYPTO 84 on Advances in cryptology
, pp. 47-53
-
-
Shamir1
-
18
-
-
35248891001
-
Access control using pairing based cryptography
-
Proceedings CT-RSA, Springer-Verlag, April
-
N Smart. "Access control using pairing based cryptography", In Proceedings CT-RSA 2003, pp 111-121. Springer-Verlag LNCS 2612, April 2003.
-
(2003)
LNCS
, vol.2612
, pp. 111-121
-
-
Smart, N.1
-
19
-
-
84961819313
-
Trustworthy access control with untrustworthy web servers
-
IEEE Computer Society
-
T Wilkinson, D Hearn, and S Wiseman, "Trustworthy access control with untrustworthy web servers", In Proceedings of the 15th Annual Computer Security Applications Conference, pp 12. IEEE Computer Society, 1999.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 12
-
-
Wilkinson, T.1
Hearn, D.2
Wiseman, S.3
-
20
-
-
57749089503
-
-
Voltage, http://www.voltage.com
-
Voltage
-
-
|