-
2
-
-
0041089975
-
On hiding information from an oracle
-
Martin Abadi, Joan Feigenbaum, and Joe Kilian. On hiding information from an oracle. Journal of Computer and System Science, 39(l):21-50, August 1989.
-
(1989)
Journal of Computer and System Science
, vol.39
, Issue.1
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
3
-
-
85028539051
-
Checking computations in polylogarithmic time
-
New Orleans, Louisiana
-
Laszlo Babai, Lance Fortnow, Leonid A. Levin, and Mario Szegedy. Checking computations in polylogarithmic time. In Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing, pages 21-31, New Orleans, Louisiana, May 1991.
-
(1991)
Proceedings of the Twenty Third Annual ACM Symposium on Theory of Computing
, pp. 21-31
-
-
Babai, L.1
Fortnow, L.2
Levin, L.A.3
Szegedy, M.4
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. In Neil Koblitz, editor, Advances in Cryptology — Crypto '96, volume 1109 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
-
(1996)
Neil Koblitz, Editor, Advances in Cryptology — Crypto '96, Volume 1109 of Lecture Notes in Computer Science. Springer-Verlag
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
84954417747
-
XOR MACs
-
Mihir Bellare, Roch Guerin, and Phillip Rogaway. XOR MACs: New methods for message authentication using finite pseudo-random functions. In Advances in Cryptology — Crypto '95, volume 963 of Lecture Notes in Computer Science, pages 15-28. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology — Crypto '95, Volume 963 of Lecture Notes in Computer Science
, pp. 15-28
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
7
-
-
84982922319
-
Computer Science and Engineering Department
-
Mihir Bellare and Bennet Yee. Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, University of California at San Diego, November 1997.
-
(1997)
Forward Integrity for Secure Audit Logs
-
-
Bellare, M.1
Yee, B.2
-
8
-
-
0012842066
-
-
Josh Benaloh, Butler Lampson, Terence Spies, Dan Simon, and Bennet S. Yee. The PCT protocol, October 1995.
-
(1995)
The PCT Protocol
-
-
Benaloh, J.1
Lampson, B.2
Spies, T.3
Simon, D.4
Yee, B.S.5
-
9
-
-
80054992065
-
Extensibility, safety and performance in the spin operating system
-
Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Giin Sirer, Marc E. Fiuczynski, David Becker, Craig Chambers, and Susan Eggers. Extensibility, safety and performance in the spin operating system. In Proceedings of the Fifteenth Symposium on Operating Systems Principles, December 1995.
-
(1995)
Proceedings of the Fifteenth Symposium on Operating Systems Principles
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
10
-
-
0029700344
-
Decentralized trust management
-
IEEE Symposium on Security and Privacy, May
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings 1996 IEEE Symposium on Security and Privacy, May 1996.
-
(1996)
Proceedings
, pp. 1996
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
11
-
-
0004035649
-
-
November, Internet Engineering Task Force Internet Draft; see
-
Tim Dierks and Christopher Allen. The TLS protocol, version 1.0, November 1998. Internet Engineering Task Force Internet Draft; see http://www.ietf.cnri.reston.va.us/internet-drafts/draift-ietf-tls-protocol-06.txt.
-
(1998)
The TLS Protocol, Version 1.0
-
-
Dierks, T.1
Allen, C.2
-
15
-
-
0011263513
-
-
Techniccd Report CS98-588, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA
-
Matthew Hohlfeld and Bennet S. Yee. How to migrate agents. Techniccd Report CS98-588, Computer Science and Engineering Department, University of California at San Diego, La Jolla, CA, August 1998.
-
(1998)
How to Migrate Agents
-
-
Hohlfeld, M.1
Yee, B.S.2
-
16
-
-
0347898492
-
Language support for extensible operating systems
-
Wilson C. Hsieh, Marc E. Fiuczynski, Charles Garrett, Stefan Savage, David Becker, and Brian N. Bershad. Language support for extensible operating systems. In Proceedings of the Workshop on Compiler Support for System Software, February 1996.
-
(1996)
Proceedings of the Workshop on Compiler Support for System Software
-
-
Hsieh, W.C.1
Fiuczynski, M.E.2
Garrett, C.3
Savage, S.4
Becker, D.5
Bershad, B.N.6
-
18
-
-
84982969499
-
-
IBM 4758 PCI, Press Release, August
-
IBM 4758 PCI cryptographic coprocessor. Press Release, August 1997. http://www.ibm.com/Security/cryptocards/.
-
(1997)
Cryptographic Coprocessor
-
-
-
19
-
-
0022114816
-
Message authentication codes
-
R. R. Jueneman, S. M. Matyas, and C. H. Meyer. Message authentication codes. IEEE Communications Magazine, 23(9):29-40, September 1985.
-
(1985)
IEEE Communications Magazine
, vol.23
, Issue.9
, pp. 29-40
-
-
Jueneman, R.R.1
Matyas, S.M.2
Meyer, C.H.3
-
20
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments
-
Joe Kilian, Victoria, British Columbia, Canada, May 1992
-
Joe Kilian. A note on efficient zero-knowledge proofs and arguments. In Proceedings of the Twenty Fourth Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 1992.
-
Proceedings of the Twenty Fourth Annual ACM Symposium on Theory of Computing
-
-
-
21
-
-
85077206746
-
-
USENIX Technical Conference Proceedings, San Diego, CA, 1993. USENIX
-
Steven McCanne and Van Jacobson. The BSD packet filter: A new architecture for user-level packet capture. In USENIX Technical Conference Proceedings, pages 259-269, San Diego, CA, 1993. USENIX.
-
The BSD Packet Filter: A New Architecture for User-Level Packet Capture
, pp. 259-269
-
-
McCanne, S.1
Jacobson, V.2
-
23
-
-
18944401242
-
-
Technical Report TR96-1600, Department of Computer Science, Cornell University
-
Yaron Minsky, Robbert van Renesse, Fred B. Schneider, and Scott D. Stoller. Cryptographic support for fault-tolerant distributed computing. Technical Report TR96-1600, Department of Computer Science, Cornell University, July 1996.
-
(1996)
Cryptographic Support for Fault-Tolerant Distributed Computing
-
-
Minsky, Y.1
Renesse, R.V.2
Schneider, F.B.3
Stoller, S.D.4
-
25
-
-
85084097858
-
Safe kernel extensions without run-time checks
-
plementation, Seattle, WA, October 1996
-
George Necula and Peter Lee. Safe kernel extensions without run-time checks. In Proceedings of the Second Symposium, on Operating Systems Design and Im,plementation, Seattle, WA, October 1996.
-
Proceedings of the Second Symposium, on Operating Systems Design and Im
-
-
Necula, G.1
Lee, P.2
-
27
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
of Lecture Notes in Computer Science, Start-of-the-Art Survey, Springer-Verlag
-
Tomas Sander and Christian F. Tschudin. Protecting mobile agents against malicious hosts. In Giovanni Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, Start-of-the-Art Survey, pages 44-60. Springer-Verlag, 1998.
-
(1998)
Giovanni Vigna, Editor, Mobile Agents and Security
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
28
-
-
0002717089
-
Cryptographic traces for mobile agents
-
Giovanni Vigna, editor, of Lecture Notes in Computer Science, State-of-the-Art Survey, Springer-Verlag
-
Giovanni Vigna. Cryptographic traces for mobile agents. In Giovanni Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science, State-of-the-Art Survey, pages 137-153. Springer-Verlag, 1998.
-
(1998)
Mobile Agents and Security
, vol.1419
, pp. 137-153
-
-
Vigna, G.1
-
30
-
-
84982868988
-
Introduction to the Citadel architecture: Security in physically exposed environments. Technical Report RC16672, Distributed security systems group
-
March 1991. Version 1.3
-
Steve R. White, Steve H. Weingart, William C. Arnold, and Elaine R. Palmer. Introduction to the Citadel architecture: Security in physically exposed environments. Technical Report RC16672, Distributed security systems group, IBM Thomas J. Watson Research Center, March 1991. Version 1.3.
-
IBM Thomas J. Watson Research Center
-
-
White, S.R.1
Weingart, S.H.2
Arnold, W.C.3
Palmer, E.R.4
-
31
-
-
84982994321
-
Introducing trusted third parties to the mobile agent paradigm
-
Springer-Verlag Inc., New York, NY, USA
-
U. Wilhelm, S. Staamann, and L. Buttyan. Introducing trusted third parties to the mobile agent paradigm. In Secure Internet Programming, Lecture Notes in Computer Science, Springer-Verlag Inc., New York, NY, USA, 1999.
-
Secure Internet Programming, Lecture Notes in Computer Science
, pp. 1999
-
-
Wilhelm, U.1
Staamann, S.2
Buttyan, L.3
-
32
-
-
0005425231
-
-
PhD thesis, Carnegie Mellon University
-
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, 1994.
-
(1994)
Using Secure Coprocessors
-
-
Yee, B.S.1
|