-
1
-
-
84936897769
-
-
Carnegie Mellon University Mercury Technical Report Series. Pittsburgh, PA: Carnegie Mellon University
-
Arms, W. et al. 1992. The Mercury Electronic Library and Library Information System II. Carnegie Mellon University Mercury Technical Report Series. Pittsburgh, PA: Carnegie Mellon University.
-
(1992)
The Mercury Electronic Library and Library Information System II
-
-
Arms, W.1
-
2
-
-
0041450577
-
Crime and Puzzlement
-
fall
-
Barlow, J. 1990. Crime and Puzzlement. Whole Earth Review (fall):45-56.
-
(1990)
Whole Earth Review
, pp. 45-56
-
-
Barlow, J.1
-
3
-
-
0003945449
-
-
Dissertation, Department of Computer Science, Yale University, New Haven, CT
-
Benaloh, J. 1987. Verifiable Secret-Ballot Elections, Dissertation, Department of Computer Science, Yale University, New Haven, CT.
-
(1987)
Verifiable Secret-Ballot Elections
-
-
Benaloh, J.1
-
6
-
-
0018443381
-
Privacy and Authentication: An Introduction to Cryptography
-
Diffie, W., and M. E. Heilman. 1979. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE. 67:18-48.
-
(1979)
Proceedings of the IEEE
, vol.67
, pp. 18-48
-
-
Diffie, W.1
Heilman, M.E.2
-
9
-
-
84952539564
-
How to Make Replicated Data Secure
-
In C. Pomerance (Ed.), Berlin: Springer-Verlag
-
Herlihy, M. P., and J. D. Tygar. 1987. How to Make Replicated Data Secure. In C. Pomerance (Ed.), Advances in Cryptography-CRYPTO 87. Berlin: Springer-Verlag.
-
(1987)
Advances in Cryptography-Crypto
, pp. 87
-
-
Herlihy, M.P.1
Tygar, J.D.2
-
10
-
-
84952566780
-
Implementing Distributed Capacities without a Trusted Kernel
-
In A. Avizienis and J. C. Caprie (Eds.), Berlin: Springer-Verlag
-
Herlihy, M. P., and J. D. Tygar. 1991. Implementing Distributed Capacities without a Trusted Kernel. In A. Avizienis and J. C. Caprie (Eds.), Dependable Computing for Critical Applications. Berlin: Springer-Verlag.
-
(1991)
Dependable Computing for Critical Applications
-
-
Herlihy, M.P.1
Tygar, J.D.2
-
12
-
-
14944366867
-
A More Cooperative Clerk: The Confidentiality of the Library Record
-
Johnson, B. S. 1989. A More Cooperative Clerk: The Confidentiality of the Library Record. Law Library Journal. 81:769-803.
-
(1989)
Law Library Journal
, vol.81
, pp. 769-803
-
-
Johnson, B.S.1
-
13
-
-
0010814656
-
Chapter 9: The Iron Fist and the Velvet Glove
-
In J. E. Short (Ed.), Beverly Hills, CA: Sage
-
Marx, G. 1986. Chapter 9: The Iron Fist and the Velvet Glove. In J. E. Short (Ed.), The Social Fabric: Dimensions and Issues, (chap. 9, pp. 135-162). Beverly Hills, CA: Sage.
-
(1986)
The Social Fabric: Dimensions and Issues
, vol.9
, pp. 135-162
-
-
Marx, G.1
-
14
-
-
84952497233
-
-
New York: Springer-Verlag
-
McCrindle, J. 1990. Smart Cards. New York: Springer-Verlag.
-
(1990)
Smart Cards
-
-
Mc Crindle, J.1
-
15
-
-
84947965807
-
Fair Public-Key Cryptosystems. Preliminary draft
-
Massachusetts Institute of Technology, Cambridge
-
Micali, S. 1993. Fair Public-Key Cryptosystems. Preliminary draft, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge.
-
(1993)
Laboratory for Computer Science
-
-
Micali, S.1
-
16
-
-
84952566781
-
Federal Information Processing Publication 46: Specifications for the Digital Encryption Standard
-
In D. W. Davies (Ed.), Los Angeles, CA: IEEE Computer Society Press
-
National Bureau of Standards. 1977. Federal Information Processing Publication 46: Specifications for the Digital Encryption Standard. In D. W. Davies (Ed.), The Security of Data in Networks (pp. 64-74). Los Angeles, CA: IEEE Computer Society Press.
-
(1977)
The Security of Data in Networks
, pp. 64-74
-
-
-
17
-
-
0003429521
-
-
Cambridge, MA: Harvard University Press
-
Pool, I. S. 1983. Technologies of Freedom. Cambridge, MA: Harvard University Press.
-
(1983)
Technologies of Freedom
-
-
Pool, I.S.1
-
20
-
-
0020926374
-
-
Proceedings, Third Symposium on Reliability in Distributed Software and Database Systems
-
Randell, B. 1983. Recursively Structured Distributed Computing Systems. Proceedings, Third Symposium on Reliability in Distributed Software and Database Systems.
-
(1983)
Recursively Structured Distributed Computing Systems
-
-
Randell, B.1
-
22
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
Rivest, R. L., A. Shamir, and L. Adleman. 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. 21:158-164.
-
(1978)
Communications of the ACM
, vol.21
, pp. 158-164
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
25
-
-
77950592956
-
Strongbox: A System for Self Securing Programs
-
In R. Rashid (Ed.), New York: Addison-Wesley and ACM Press
-
Tygar, J. D., and B. Yee. 1991a. Strongbox: A System for Self Securing Programs. In R. Rashid (Ed.), CMU Computer Science: A 25th Anniversary Commemorative (pp. 163-198). New York: Addison-Wesley and ACM Press.
-
(1991)
CMU Computer Science: A 25Th Anniversary Commemorative
, pp. 163-198
-
-
Tygar, J.D.1
Yee, B.2
-
26
-
-
84952566785
-
Strongbox
-
In J. L. Eppinger (Ed.), San Mateo, CA: Morgan Kaufmann Publishers, Inc
-
Tygar, J. D., and B. Yee. 1991b. Strongbox. In J. L. Eppinger (Ed.), Camelot and Avalon: A Distributed Transaction Facility Including the Avalon Language (pp. 381-400). San Mateo, CA: Morgan Kaufmann Publishers, Inc.
-
(1991)
Camelot and Avalon: A Distributed Transaction Facility including the Avalon Language
, pp. 381-400
-
-
Tygar, J.D.1
Yee, B.2
|