-
1
-
-
0025386404
-
A logic of authentication
-
February
-
Michael Burrows, Martin Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
84976766949
-
The entity-relationship model: Toward a unified view of data
-
Peter Pin-Shan S. Chen. The entity-relationship model: Toward a unified view of data. ACM Transactions on Database Systems, 1(1):9-36, 1976.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, Issue.1
, pp. 9-36
-
-
Pin-Shan, P.1
Chen, S.2
-
4
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Deborah Cooper and Teresa Lunt, editors IEEE Computer Society
-
Li Gong, Roger Needham, and Raphael Yahalom. Reasoning About Belief in Cryptographic Protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
5
-
-
10844288659
-
Using probabilistic argumentation for key validation in public-key cryptography
-
R. Haenni. Using probabilistic argumentation for key validation in public-key cryptography. International Journal of Approximate Reasoning, 38(3):355-376, 2005.
-
(2005)
International Journal of Approximate Reasoning
, vol.38
, Issue.3
, pp. 355-376
-
-
Haenni, R.1
-
6
-
-
84883293902
-
Credential networks: A general model for distributed trust and authenticity management
-
A. Ghorbani and S. Marsh, editors St. Andrews, Canada
-
J. Jonczy and R. Haenni. Credential networks: a general model for distributed trust and authenticity management. In A. Ghorbani and S. Marsh, editors, PST'05: 3rd Annual Conference on Privacy, Security and Trust, pages 101-112, St. Andrews, Canada, 2005.
-
(2005)
PST'05: 3rd Annual Conference on Privacy, Security and Trust
, pp. 101-112
-
-
Jonczy, J.1
Haenni, R.2
-
8
-
-
22644449732
-
Reasoning about public-key certification: On bindings between entities and public keys
-
M. K. Franklin, editor LNCS 1648 Anguilla, British West Indies Springer
-
R. Kohlas and U. Maurer. Reasoning about public-key certification: On bindings between entities and public keys. In M. K. Franklin, editor, Financial Cryptography'99, Third International Conference, LNCS 1648, pages 86-103, Anguilla, British West Indies, 1999. Springer.
-
(1999)
Financial Cryptography'99, Third International Conference
, pp. 86-103
-
-
Kohlas, R.1
Maurer, U.2
-
9
-
-
84957803553
-
Confidence valuation in a public-key infrastructure based on uncertain evidence
-
H. Imai and Y. Zheng, editors LNCS 1751 Melbourne, Australia Springer
-
R. Kohlas and U. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In H. Imai and Y. Zheng, editors, PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography, LNCS 1751, pages 93-112, Melbourne, Australia, 2000. Springer.
-
(2000)
PKC'2000, Third International Workshop on Practice and Theory in Public Key Cryptography
, pp. 93-112
-
-
Kohlas, R.1
Maurer, U.2
-
10
-
-
84947294004
-
Modelling a public-key infrastructure
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors LNCS 1146 Springer
-
U. Maurer. Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, ESORICS, European Symposium on Research in Computer Security, LNCS 1146, pages 324-350. Springer, 1996.
-
(1996)
ESORICS, European Symposium on Research in Computer Security
, pp. 324-350
-
-
Maurer, U.1
-
11
-
-
0039806331
-
-
John Wiley & Sons, Inc., New York, NY, USA
-
K. Meinke and J. V. Tucker, editors. Many-sorted logic and its applications. John Wiley & Sons, Inc., New York, NY, USA, 1993.
-
(1993)
Many-sorted Logic and its Applications
-
-
Meinke, K.1
Tucker, J.V.2
-
12
-
-
84944878354
-
-
CRC Press, Boca Raton, USA
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, USA, 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
13
-
-
0043126255
-
A method for obtaining digital signatures and public-key cryptosystems
-
Cambridge, USA
-
R. L. Rivest, A. Shamir, and L. M. Adelman. A method for obtaining digital signatures and public-key cryptosystems. Technical Report TM-82, MIT, Cambridge, USA, 1977.
-
(1977)
Technical Report TM-82, MIT
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.M.3
-
16
-
-
77957184777
-
Many-sorted first-order logic database language
-
J. S. II. Yang, Y. H. Chin, and C. G. Chung. Many-sorted first-order logic database language. Comput. J., 35(2):129-137, 1992.
-
(1992)
Comput. J.
, vol.35
, Issue.2
, pp. 129-137
-
-
Yang II, J.S.1
Chin, Y.H.2
Chung, C.G.3
|