-
1
-
-
0001989185
-
A New Family of Authentication Protocols
-
R. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas, R.M. Needham, “A New Family of Authentication Protocols”, Operating Systems Review, 32(4):9-20, 1998.
-
(1998)
Operating Systems Review
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.1
Bergadano, F.2
Crispo, B.3
Lee, J.H.4
Manifavas, C.5
Needham, R.M.6
-
2
-
-
84949757635
-
Server Supported Signatures
-
Rome, Italy, September
-
N. Asokan, G. Tsudik and M. Waidner, “Server Supported Signatures”, Proc.1996 Esorics, Rome, Italy, September 1996 pp. 131-143.
-
(1996)
Proc.1996 Esorics
, pp. 131-143
-
-
Asokan, N.1
Tsudik, G.2
Waidner, M.3
-
5
-
-
84949244021
-
-
Seminar held at IBM T. J. Watson Research Center, August
-
F. Bergadano and B. Crispo, “Multiparty Authentication, Fast and Short”, Seminar held at IBM T. J. Watson Research Center, August 1998. http://www.research.ibm.com/security/seminar.html
-
(1998)
Multiparty Authentication, Fast and Short
-
-
Bergadano, F.1
Crispo, B.2
-
10
-
-
0029362456
-
On key storage in secure networks
-
M. Dyer, T. Fenner, A. Frieze, A. Thomason, “On key storage in secure networks”, Journal of Cryptology, vol. 8, 1995, pp. 189-200.
-
(1995)
Journal of Cryptology
, vol.8
, pp. 189-200
-
-
Dyer, M.1
Fenner, T.2
Frieze, A.3
Thomason, A.4
-
13
-
-
0023985465
-
ADigital Signature Scheme Secure Against Adaptive Chosen Message Attacks
-
April
-
S. Goldwasser, S. Micali, R.L. Rivest, “ADigital Signature Scheme Secure Against Adaptive Chosen Message Attacks”, in SIAM Journal of Computing v. 17 no. 2 (April 1988) pp. 281-308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
14
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, S. Micali, “How to Construct Random Functions”, Journal of the ACM, vol. 33:4, 1986, pp. 210-217.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 210-217
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
17
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Nov
-
L. Lamport, “Password Authentication with Insecure Communication”, Communication of the ACM, 24:11, Nov. 1981, pp. 770-772.
-
(1981)
Communication of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
18
-
-
84958802026
-
ADigital Signature Based on a Conventional Encryption Function
-
(Springer LNCS v. 293)
-
R.C. Merkle, “ADigital Signature Based on a Conventional Encryption Function”, in Advances in Cryptology — CRYPTO 87 (Springer LNCS v. 293) pp. 369-378.
-
Advances in Cryptology — CRYPTO 87
, pp. 369-378
-
-
Merkle, R.C.1
-
19
-
-
0032120218
-
Reliable Multicast: When Many Must Absolutely Positively Receive It
-
July
-
C. Metz, “Reliable Multicast: When Many Must Absolutely Positively Receive It”, IEEE Internet Computing, pp. 9-13, July 1998.
-
(1998)
IEEE Internet Computing
, pp. 9-13
-
-
Metz, C.1
-
21
-
-
24644473570
-
Iolus: A Framework for Scalable Secure Multicast
-
Cannes, September
-
S. Mittra, “Iolus: a Framework for Scalable Secure Multicast”, in ACM SIGCOMM, Cannes, September 1997.
-
(1997)
ACM SIGCOMM
-
-
Mittra, S.1
-
22
-
-
0033690336
-
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
-
Oakland, California, USA
-
A. Perrig, R. Canetti, J. D. Tygar and D. Song, “Efficient Authentication and Signing of Multicast Streams over Lossy Channels”, IEEE Symposium on Security and Privacy, Oakland, California, USA, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
0002527931
-
PayWord and MicroMint: Two Simple Micropayment Schemes
-
Cambridge, UK, April
-
R. L. Rivest and A. Shamir, “PayWord and MicroMint: Two Simple Micropayment Schemes”, Proc. 1996 Security Protocols Workshop, Cambridge, UK, April 1996, pp. 69-87.
-
(1996)
Proc. 1996 Security Protocols Workshop
, pp. 69-87
-
-
Rivest, R.L.1
Shamir, A.2
|