-
2
-
-
78649990676
-
-
Francisco Amato. ISR-evilgrade. http://www.infobyte.com.ar/down/isr- evilgrade- Readme.txt.
-
ISR-evilgrade
-
-
Amato, F.1
-
4
-
-
78650002100
-
-
APT HOWTO. http://www.debian.org/doc/manuals/apt-howto/.
-
-
-
-
6
-
-
34547339273
-
Multi-signatures in the plain public-key model and a general forking lemma
-
New York, NY, USA. ACM
-
Mihir Bellare and Gregory Neven. Multi-signatures in the plain public-key model and a general forking lemma. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 390-399, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 390-399
-
-
Bellare, M.1
Neven, G.2
-
7
-
-
85091949126
-
Secure software updates: Disappointments and new challenges
-
Vancouver, Canada, Jul
-
Anthony Bellissimo, John Burgess, and Kevin Fu. Secure software updates: Disappointments and new challenges. In 1st USENIX Workshop on Hot Topics in Security, pages 37-43, Vancouver, Canada, Jul 2006.
-
(2006)
1st USENIX Workshop on Hot Topics in Security
, pp. 37-43
-
-
Bellissimo, A.1
Burgess, J.2
Fu, K.3
-
8
-
-
85084163661
-
A method for fast revocation of public key certificates and security capabilities
-
USENIX Association
-
D. Boneh, X. Ding, G. Tsudik, and C.M. Wong. A method for fast revocation of public key certificates and security capabilities. In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, page 22. USENIX Association, 2001.
-
(2001)
Proceedings of the 10th Conference on USENIX Security Symposium
, vol.10
, pp. 22
-
-
Boneh, D.1
Ding, X.2
Tsudik, G.3
Wong, C.M.4
-
11
-
-
70349278544
-
A look in the mirror: Attacks on package managers
-
New York, NY, USA. ACM
-
Justin Cappos, Justin Samuel, Scott Baker, and John Hartman. A look in the mirror: Attacks on package managers. In Proc. 15th ACM Conference on Computer and Communications Security, pages 565-574, New York, NY, USA, 2008. ACM.
-
(2008)
Proc. 15th ACM Conference on Computer and Communications Security
, pp. 565-574
-
-
Cappos, J.1
Samuel, J.2
Baker, S.3
Hartman, J.4
-
15
-
-
78650030977
-
-
Mar
-
Microsoft Corporation. Microsoft security bulletin MS01-017, Mar 2001. http://www.microsoft.com/technet/security/bulletin/MS01-017.mspx.
-
(2001)
Microsoft Security Bulletin MS01-017
-
-
-
16
-
-
78650005801
-
-
CPAN. http://www.cpan.org/.
-
-
-
-
18
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Springer
-
Y. Desmedt. Society and group oriented cryptography: A new concept. In Advances in Cryptology - Crypto 1987, pages 120-127. Springer, 1987.
-
(1987)
Advances in Cryptology - Crypto 1987
, pp. 120-127
-
-
Desmedt, Y.1
-
21
-
-
78650007979
-
-
New signing key. https://fedoraproject.org/wiki/New-signing-key.
-
New Signing Key
-
-
-
22
-
-
78649983623
-
-
Firefox update. http://www.mozilla.com/en-US/firefox/update/.
-
-
-
-
23
-
-
78649989289
-
-
2008-08-22 UTC 1200, Aug
-
Paul W. Frields. Infrastructure report, 2008-08-22 UTC 1200, Aug 2008. https://www.redhat.com/archives/fedora-announce-list/2008-August/msg00012.html.
-
(2008)
Infrastructure Report
-
-
Frields, P.W.1
-
29
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto. Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 79(9):1338-1354, 1996.
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.79
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
39
-
-
11144272135
-
RFC2560: X. 509 Internet public key infrastructure online certificate status protocol-OCSP
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. RFC2560: X. 509 Internet public key infrastructure online certificate status protocol-OCSP. Internet RFCs, 1999.
-
(1999)
Internet RFCs
-
-
Myers, M.1
Ankney, R.2
Malpani, A.3
Galperin, S.4
Adams, C.5
-
41
-
-
0027316628
-
Proxy-based authorization and accounting for distributed systems
-
Citeseer
-
B.C. Neuman et al. Proxy-based authorization and accounting for distributed systems. In International Conference on Distributed Computing Systems, volume 13, pages 283-283. Citeseer, 1993.
-
(1993)
International Conference on Distributed Computing Systems
, vol.13
, pp. 283-283
-
-
Neuman, B.C.1
-
42
-
-
11244338691
-
Beware of BGP attacks. SIGCOMM comput
-
O. Nordstrom and C. Dovrolis. Beware of BGP attacks. SIGCOMM Comput. Commun. Rev, 34(2):1-8, 2004.
-
(2004)
Commun. Rev
, vol.34
, Issue.2
, pp. 1-8
-
-
Nordstrom, O.1
Dovrolis, C.2
-
47
-
-
84958042111
-
Can we eliminate certificate revocation lists?
-
Springer
-
R. Rivest. Can we eliminate certificate revocation lists? In Financial Cryptography, pages 178-183. Springer, 1998.
-
(1998)
Financial Cryptography
, pp. 178-183
-
-
Rivest, R.1
-
53
-
-
70350698232
-
-
Dec
-
Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, and Benne de Weger. MD5 considered harmful today: Creating a rogue CA certificate, Dec 2008. http://www.win.tue.nl/hashclash/ rogue-ca/.
-
(2008)
MD5 Considered Harmful Today: Creating A Rogue CA Certificate
-
-
Sotirov, A.1
Stevens, M.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.A.6
De Weger, B.7
-
57
-
-
0026156775
-
An analysis of the proxy problem in distributed systems
-
V. Varadharajan, P. Allen, and S. Black. An analysis of the proxy problem in distributed systems. In 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991. Proceedings., pages 255-275, 1991.
-
(1991)
1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991. Proceedings
, pp. 255-275
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
|