-
1
-
-
0017983865
-
Binary decision diagrams
-
Akers S.B. Binary decision diagrams. IEEE Transactions on Computers C-27 6 (June 1978) 509-516
-
(1978)
IEEE Transactions on Computers
, vol.C-27
, Issue.6
, pp. 509-516
-
-
Akers, S.B.1
-
2
-
-
0022769976
-
Graph-based algorithms for Boolean function manipulation
-
Bryant R.E. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers C-35 8 (1986) 677-691
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
3
-
-
4444341241
-
Content-triggered trust negotiation
-
Hess A., Holt J., Jacobson J., and Seamons K.E. Content-triggered trust negotiation. ACM Transactions on Information and System Security 7 3 (August 2004) 428-456
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 428-456
-
-
Hess, A.1
Holt, J.2
Jacobson, J.3
Seamons, K.E.4
-
4
-
-
85180810679
-
Advanced client/server authentication in TLS
-
February
-
Hess A, Jacobson J, Mills H, Wamsley R, Seamons KE, Smith B. Advanced client/server authentication in TLS. In: Network and distributed system security symposium; February 2002. p. 203-14.
-
(2002)
Network and distributed system security symposium
, pp. 203-214
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
6
-
-
33745772562
-
Preventing attribute information leakage in automated trust negotiation
-
CCS, Alexandria, VA; November
-
Irwin K, Yu T. Preventing attribute information leakage in automated trust negotiation. In: ACM conference on computer and communications security (CCS), Alexandria, VA; November 2005.
-
(2005)
ACM conference on computer and communications security
-
-
Irwin, K.1
Yu, T.2
-
7
-
-
14844322854
-
Know why your access was denied: Regulating feedback for usable security
-
Washington, DC, USA; October
-
Kapadia A, Sampemane G, Campbell RH. Know why your access was denied: regulating feedback for usable security. In: ACM conference on computer and communication security, Washington, DC, USA; October 2004.
-
(2004)
ACM conference on computer and communication security
-
-
Kapadia, A.1
Sampemane, G.2
Campbell, R.H.3
-
8
-
-
84903828974
-
Representation of switching circuits by binary-decision programs
-
Lee C.Y. Representation of switching circuits by binary-decision programs. Bell System Technical Journal 38 (July 1959) 985-999
-
(1959)
Bell System Technical Journal
, vol.38
, pp. 985-999
-
-
Lee, C.Y.1
-
15
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
Springer-Verlag
-
Seamons K.E., Winslett M., Yu T., Yu L., and Jarvis R. Protecting privacy during on-line trust negotiation. Second workshop on privacy enhancing technologies (April 2002), Springer-Verlag
-
(2002)
Second workshop on privacy enhancing technologies
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
18
-
-
84893110297
-
Towards practical automated trust negotiation
-
IEEE Computer Society Press
-
Winsborough W.H., and Li N. Towards practical automated trust negotiation. Policy 2002 (2002), IEEE Computer Society Press 92-103
-
(2002)
Policy 2002
, pp. 92-103
-
-
Winsborough, W.H.1
Li, N.2
-
21
-
-
0036871183
-
Negotiating trust on the web
-
Winslett M., Yu T., Seamons K.E., Hess A., Jacobson J., Jarvis R., et al. Negotiating trust on the web. IEEE Internet Computing 6 6 (November 2002) 30-37
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
-
22
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
IEEE Computer Society Press
-
Yu T., and Winslett M. A unified scheme for resource protection in automated trust negotiation. Proceedings of IEEE symposium on security and privacy (May 2003), IEEE Computer Society Press 110-122
-
(2003)
Proceedings of IEEE symposium on security and privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
23
-
-
0034449542
-
PRUNES: An efficient and complete strategy for automated trust negotiation over the internet
-
Athens, Greece; November
-
Yu T, Ma X, Winslett M. PRUNES: an efficient and complete strategy for automated trust negotiation over the internet. In: ACM conference on computer and communication security, Athens, Greece; November 2000.
-
(2000)
ACM conference on computer and communication security
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
25
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu T., Winslett M., and Seamons K.E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 6 1 (February 2003) 1-42
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|