-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sep.
-
M. Abadi, M. Burrows, B. Lampson, and G. A. Plotkin, "A Calculus for Access Control in Distributed Systems," ACM Trans. Program. Lang. Sys., 15(4), Sep. 1993, pp. 706-734.
-
(1993)
ACM Trans. Program. Lang. Sys.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.A.4
-
2
-
-
85045333296
-
-
Internet Draft, ftp.ietf.org
-
C. Adams, P. Cain, D. Pinkas, and R. Zuccherato, "Time Stamp Protocols," Internet Draft, ftp.ietf.org.
-
Time Stamp Protocols
-
-
Adams, C.1
Cain, P.2
Pinkas, D.3
Zuccherato, R.4
-
3
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M. Burrows, M. Abadi, and R. Needham, "A Logic of Authentication," ACM Trans. on Computer Systems, Vol. 8, No. 1, Feb. 1990, pp. 18-36.
-
(1990)
M Trans. on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0001710760
-
The design and implementation of a secure auction service
-
M. K. Franklin and M. K. Reiter, "The Design and Implementation of a Secure Auction Service," IEEE Trans. on Software Engineering, Vol. 22, No. 5, 1995, pp. 302-312.
-
(1995)
EE Trans. on Software Engineering
, vol.22
, Issue.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
5
-
-
85028754690
-
How to time-stamp a digital document
-
ringer-Verlag
-
S. Haber and W. S. Stornetta, "How to Time-Stamp a Digital Document," Proceedings of Crypto '90, Lecture Notes in Computer Science, 537, Springer-Verlag, 1991, pp. 437-455.
-
(1991)
Proceedings of Crypto '90, Lecture Notes in Computer Science
, vol.537
, pp. 437-455
-
-
Haber, S.1
Stornetta, W.S.2
-
6
-
-
33745689203
-
Accountability in electronic commerce protocols
-
May
-
R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Trans. on Software Engineering, Vol. 22, No. 5, May, 1996, pp. 313-328.
-
(1996)
EE Trans. on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
7
-
-
0031679773
-
Secure electronic sealed-bid auction protocol with public key cryptography
-
Jan.
-
M. Kudo, "Secure Electronic Sealed-Bid Auction Protocol with Public Key Cryptography," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No. 1, Jan. 1998, pp. 20-27.
-
(1998)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E81-A
, Issue.1
, pp. 20-27
-
-
Kudo, M.1
-
8
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Nov.
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in Distributed Systems: Theory and Practice," ACM Trans. Computer Systems, 10(4), Nov. 1992, pp. 265-310.
-
(1992)
ACM Trans. Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
9
-
-
0026242010
-
Internet time synchronization: The network time protocol
-
D. L. Mills, "Internet Time Synchronization: The Network Time Protocol," IEEE Transactions on Communication, Vol. 39, 1991, pp. 1482-1493.
-
(1991)
IEEE Transactions on Communication
, vol.39
, pp. 1482-1493
-
-
Mills, D.L.1
-
12
-
-
0029711077
-
An authentication logic supporting synchronization, revocation, and recency
-
Mar.
-
S. G. Stubblebine, and R. N. Wright, "An Authentication Logic Supporting Synchronization, Revocation, and Recency," 3rd ACM Conference on Computer and Communications Security, Mar. 1996, pp. 95-105.
-
(1996)
3rd ACM Conference on Computer and Communications Security
, pp. 95-105
-
-
Stubblebine, S.G.1
Wright, R.N.2
|