-
1
-
-
84949487550
-
Service-Based Software: The Future for Flexible Software
-
K. Bennett, P. Layzel, D. Budgen, P. Brereton, L. Macaulay, and M. Munro, "Service-Based Software: The Future for Flexible Software," Proceeding of the Seventh Asia-Pacific Software Engineering Conference, 2000, pp. 214-221.
-
(2000)
Proceeding of The Seventh Asia-Pacific Software Engineering Conference
, pp. 214-221
-
-
Bennett, K.1
Layzel, P.2
Budgen, D.3
Brereton, P.4
Macaulay, L.5
Munro, M.6
-
2
-
-
44149084292
-
The Security Limitations of SSO in OpenID
-
H.-K. Oh, and S.-H. Jin, "The Security Limitations of SSO in OpenID," Proceeding of the 10th International Conference on Advanced Communication Technology, ICACT 2008, 2008, pp. 1608-1611.
-
(2008)
Proceeding of The 10th International Conference On Advanced Communication Technology, ICACT
, vol.2008
, pp. 1608-1611
-
-
Oh, H.-K.1
Jin, S.-H.2
-
3
-
-
0028514601
-
Kerberos: An Authentication Service for Computer Networks
-
B.C. Neuman, and T. Ts'o, "Kerberos: An Authentication Service for Computer Networks," IEEE Communications, vol. 32, no. 9, 1994, pp. 33-38.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
5
-
-
0037715403
-
A hybrid authentication protocol for large mobile network
-
H.-Y. Chien, and J.-K. Jan, "A hybrid authentication protocol for large mobile network," Journal of Systems and Software, vol. 67, no. 2, 2003, pp. 123-130.
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 123-130
-
-
Chien, H.-Y.1
Jan, J.-K.2
-
6
-
-
33645146036
-
Cryptanalysis of a hybrid authentication protocol for large mobile networks
-
Q. Tang, and C.J. Mitchell, "Cryptanalysis of a hybrid authentication protocol for large mobile networks," Journal of Systems and Software, vol. 79, no. 4, 2006, pp. 496-501.
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.4
, pp. 496-501
-
-
Tang, Q.1
Mitchell, C.J.2
-
7
-
-
34247368415
-
A Lightweight Distributed Group Authentication Mechanism
-
L.A. Martucci, T.C.M.B. Carvalho, and W.V. Ruggiero, "A Lightweight Distributed Group Authentication Mechanism," Proceeding of the Fourth International Network Conference INC2004, 2004, pp. 393-400.
-
(2004)
Proceeding of The Fourth International Network Conference INC2004
, pp. 393-400
-
-
Martucci, L.A.1
Carvalho, T.C.M.B.2
Ruggiero, W.V.3
-
9
-
-
0030086382
-
Role-Based Access Control Models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," IEEE Computer, vol. 29, no. 2, 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
10
-
-
70349654109
-
Package-Role Based Authorization Control Model for Wireless Network Services
-
H.H. Ngo, a.X. Wu, P.D. Le, and C. Wilson, "Package-Role Based Authorization Control Model for Wireless Network Services," Proceeding of the International Conference on Availability, Reliability and Security, ARES 2009, 2009, pp. 475-480.
-
(2009)
Proceeding of The International Conference On Availability, Reliability and Security, ARES 2009
, pp. 475-480
-
-
Ngo, H.H.1
Wu, A.X.2
Le, P.D.3
Wilson, C.4
-
11
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. Shannon, "Communication Theory of Secrecy Systems," Bell System Technical Journal, vol. 28, no. 4, 1949, pp. 656-715.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
12
-
-
77954329685
-
Dynamic Key Cryptography and Applications
-
H.H. Ngo, X. Wu, P.D. Le, and B. Srinivasan, "Dynamic Key Cryptography and Applications," International Journal of Network Security, vol. 10, no. 3, 2010, pp. 161-174.
-
(2010)
International Journal of Network Security
, vol.10
, Issue.3
, pp. 161-174
-
-
Ngo, H.H.1
Wu, X.2
Le, P.D.3
Srinivasan, B.4
-
13
-
-
46749151763
-
Hybrid Group Key Management Scheme For Secure Wireless Multicast
-
Y. Wang, P.D. Le, and B. Srinivasan, "Hybrid Group Key Management Scheme For Secure Wireless Multicast," Proceeding of the 6th IEEE/ACIS International Conference on Computer and Information Science, 2007, pp. 346-351.
-
(2007)
Proceeding of The 6th IEEE/ACIS International Conference On Computer and Information Science
, pp. 346-351
-
-
Wang, Y.1
Le, P.D.2
Srinivasan, B.3
-
15
-
-
35248816980
-
Principles for Entity Authentication
-
Springer Berlin/Heidelberg
-
M. Bugliesi, R. Focardi, M. Maffei, and F. Tudone, "Principles for Entity Authentication," Proceeding of the 5th International Conference Perspectives of System Informatics, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 2000, pp. 294-307.
-
(2000)
Proceeding of The 5th International Conference Perspectives of System Informatics, Lecture Notes In Computer Science
, pp. 294-307
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
Tudone, F.4
-
17
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Transactions on Computer Systems, vol. 8, no. 1, 1990, pp. 18-36.
-
(1990)
ACM Transactions On Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
|