-
2
-
-
84948986458
-
Optimal asymmetric encryption-how to encrypt with RSA
-
In A. De Santis, editor, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption-how to encrypt with RSA. In A. De Santis, editor, Advances in Cryptology-Eurocrypt 1994, volume 950 of Lecture Notes in Computer Science, pages 92-111. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology-Eurocrypt 1994, Volume 950 of Lecture Notes in Computer Science
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84947906522
-
The exact security of digital signatures-how to sign with RSA and rabin
-
In U. Maurer, editor, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. The exact security of digital signatures-how to sign with RSA and Rabin. In U. Maurer, editor, Advances in Cryptology-Eurocrypt 1996, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-Eurocrypt 1996, Volume 1070 of Lecture Notes in Computer Science
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0003563576
-
-
Technical Report, Digital Systems Research Center, Palo Alto, CA, September
-
Andrew D. Birrell, Andy Hisgen, Chuck Jerian, Timothy Mann, and Garret Swart. The Echo distributed file system. Technical Report 111, Digital Systems Research Center, Palo Alto, CA, September 1993.
-
(1993)
The Echo Distributed File System
-
-
Birrell, A.D.1
Hisgen, A.2
Jerian, C.3
Mann, T.4
Swart, G.5
-
5
-
-
0022614501
-
A global authentication service without global trust
-
Oakland, CA
-
Andrew D. Birrell, Butler W. Lampson, Roger M. Needham, and Michael D. Schroeder. A global authentication service without global trust. In Proceedings of the 1986 IEEE Symposium on Security and Privacy, pages 223-230, Oakland, CA, 1986.
-
(1986)
Proceedings of the 1986 IEEE Symposium on Security and Privacy
, pp. 223-230
-
-
Birrell, A.D.1
Lampson, B.W.2
Needham, R.M.3
Schroeder, M.D.4
-
7
-
-
21644433904
-
-
Work in progress
-
Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylönen. SPKI certificate documentation. Work in progress, from http://www.clark.net/pub/cme/html/spki.html.
-
SPKI Certificate Documentation
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylönen, T.6
-
8
-
-
0003629991
-
-
FIPS 180-1. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
9
-
-
0003508562
-
-
FTPS 186. U.S. Department of Commerce/N.I.S.T, National Technical Information Service, Springfield, VA
-
FTPS 186. Digital Signature Standard. U.S. Department of Commerce/N.I.S.T, National Technical Information Service, Springfield, VA, 1994.
-
(1994)
Digital Signature Standard
-
-
-
10
-
-
0004249393
-
-
Internet draft (draft-freier-ssl-version3-02.txt), Network Working Group, November. Work in progress
-
Alan O. Freier, Philip Karlton, and Paul C. Kocher. The SSL protocol version 3.0. Internet draft (draft-freier-ssl-version3-02.txt), Network Working Group, November 1996. Work in progress.
-
(1996)
The SSL Protocol Version 3.0
-
-
Freier, A.O.1
Karlton, P.2
Kocher, P.C.3
-
11
-
-
0028374136
-
File system development with stackable layers
-
February
-
John S. Heidemann and Gerald J. Popek. File system development with stackable layers. ACM Transactions on Computer Systems, 12(1):58-89, February 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 58-89
-
-
Heidemann, J.S.1
Popek, G.J.2
-
12
-
-
0023964787
-
Scale and performance in a distributed file system
-
February
-
John H. Howard, Michael L. Kazar, Sherri G. Menées, David A. Nichols, M. Satyanarayanan, Robert N. Side-botham, and Michael J. West. Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1):51-81, February 1988.
-
(1988)
ACM Transactions on Computer Systems
, vol.6
, Issue.1
, pp. 51-81
-
-
Howard, J.H.1
Kazar, M.L.2
Menées, S.G.3
Nichols, D.A.4
Satyanarayanan, M.5
Side-Botham, R.N.6
West, M.J.7
-
13
-
-
2342513084
-
-
Internet draft (draft-kaukonen-cipher-arcfour-03), Network Working Group, July. Work in progress
-
Kalle Kaukonen and Rodney Thayer. A stream cipher encryption algorithm "arcfour". Internet draft (draft-kaukonen-cipher-arcfour-03), Network Working Group, July 1999. Work in progress.
-
(1999)
A Stream Cipher Encryption Algorithm "Arcfour"
-
-
Kaukonen, K.1
Thayer, R.2
-
14
-
-
0041482823
-
DEcorum file system architectural overview
-
Anaheim, CA, USENIX
-
Michael L. Kazar, Bruce W. Leverett, Owen T. Anderson, Vasilis Apostolides, Beth A. Bottos, Sailesh Chutani, Craig F. Everhart, W. Anthony Mason, Shu-Tsui Tu, and Edward R. Zayas. DEcorum file system architectural overview. In Proceedings of the Summer 1990 USENIX, pages 151-163, Anaheim, CA, 1990. USENIX.
-
(1990)
Proceedings of the Summer 1990 USENIX
, pp. 151-163
-
-
Kazar, M.L.1
Leverett, B.W.2
Anderson, O.T.3
Apostolides, V.4
Bottos, B.A.5
Chutani, S.6
Everhart, C.F.7
Anthony Mason, W.8
Tu, S.-T.9
Zayas, E.R.10
-
16
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
Butler Lampson, Martin Abadi, Michael Burrows, and Edward P. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.P.4
-
17
-
-
0028430482
-
A coherent distributed file cache with directory write-behind
-
May
-
Timothy Mann, Andrew D. Birrell, Andy Hisgen, Chuck Jerian, and Garret Swart. A coherent distributed file cache with directory write-behind. ACM Transactions on Computer Systems, 12(2):123-164, May 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.2
, pp. 123-164
-
-
Mann, T.1
Birrell, A.D.2
Hisgen, A.3
Jerian, C.4
Swart, G.5
-
18
-
-
0002532551
-
Why aren't operating systems getting faster as fast as hardware?
-
Anaheim, CA, June
-
John K. Ousterhout. Why aren't operating systems getting faster as fast as hardware? In Summer USENIX '90, pages 247-256, Anaheim, CA, June 1990.
-
(1990)
Summer USENIX '90
, pp. 247-256
-
-
Ousterhout, J.K.1
-
20
-
-
0002791623
-
Truffles - A secure service for widespread file sharing
-
San Diego, CA
-
Peter Reiher, Jr. Thomas Page, Gerald J. Popek, Jeff Cook, and Stephen Crocker. Truffles - a secure service for widespread file sharing. In Proceedings of the PSRG Workshop on Network and Distributed System Security, pages 101-119, San Diego, CA, 1993.
-
(1993)
Proceedings of the PSRG Workshop on Network and Distributed System Security
, pp. 101-119
-
-
Reiher, P.1
Page, T.2
Popek, G.J.3
Cook, J.4
Crocker, S.5
-
23
-
-
0000432429
-
Design and implementation of the sun network filesystem
-
Portland, OR, USENIX
-
Russel Sandberg, David Goldberg, Steve Kleiman, Dan Walsh, and Bob Lyon. Design and implementation of the Sun network filesystem. In Proceedings of the Summer 1985 USENIX, pages 119-130, Portland, OR, 1985. USENIX.
-
(1985)
Proceedings of the Summer 1985 USENIX
, pp. 119-130
-
-
Sandberg, R.1
Goldberg, D.2
Kleiman, S.3
Walsh, D.4
Lyon, B.5
-
24
-
-
0024714097
-
Integrating security in a large distributed system
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
25
-
-
0042985426
-
Scalable, secure and highly available file access in a distributed workstation environment
-
May
-
M. Satyanarayanan. Scalable, secure and highly available file access in a distributed workstation environment. IEEE Computer, pages 9-21, May 1990.
-
(1990)
IEEE Computer
, pp. 9-21
-
-
Satyanarayanan, M.1
-
26
-
-
0001254670
-
Description of a new variable-length key, 64-bit block cipher (blowfish)
-
Springer-Verlag, December
-
Bruce Schneier. Description of a new variable-length key, 64-bit block cipher (blowfish). In Fast Software Encryption, Cambridge Security Workshop Proceedings, pages 191-204. Springer-Verlag, December 1993.
-
(1993)
Fast Software Encryption, Cambridge Security Workshop Proceedings
, pp. 191-204
-
-
Schneier, B.1
-
29
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX, February. USENIX
-
J. G. Steiner, B. C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX, pages 191-202, Dallas, TX, February 1988. USENIX.
-
(1988)
Proceedings of the Winter 1988 USENIX
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, B.C.2
Schiller, J.I.3
-
30
-
-
1542379505
-
-
PhD thesis, Department of Computer Science, University of California, Berkeley, December
-
Amin Vahdat. Operating System Services for Wide-Area Applications. PhD thesis, Department of Computer Science, University of California, Berkeley, December 1998.
-
(1998)
Operating System Services for Wide-Area Applications
-
-
Vahdat, A.1
-
31
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
November
-
Hugh C. Williams. A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory, IT-26(6):726-729, November 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.IT-26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
-
32
-
-
0028380781
-
Authentication in the taos operating system
-
Edward P. Wobber, Martin Abadi, Michael Burrows, and Butler Lampson. Authentication in the Taos operating system. ACM Transactions on Computer Systems, 12(1):3-32, 1994.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.P.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
-
34
-
-
85084164692
-
SSH - secure login connections over the internet
-
San Jose, CA, July
-
Tatu Ylönen. SSH - secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37-42, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 37-42
-
-
Ylönen, T.1
|