-
2
-
-
0025568003
-
Value exchange systems enabling security and unobservability
-
H. Biirk and A. Pfitzmajin. Value exchange systems enabling security and unobservability. Computers & Security, 9(8):715-721, 1990.
-
(1990)
Computers & Security
, vol.9
, Issue.8
, pp. 715-721
-
-
Biirk, H.1
Pfitzmajin, A.2
-
3
-
-
0030615467
-
Designing distributed applications with mobile code paxadigms
-
R.Taylor, editor
-
A. Carzaniga, G. P. Picco, and G. Vigna. Designing distributed applications with mobile code paxadigms. In R.Taylor, editor. Proceedings of the 19th International Conference on Software Engineering (ICSE'97), pages 22-32. ACM Press, 1997.
-
(1997)
Proceedings of the 19Th International Conference on Software Engineering (ICSE'97)
, pp. 22-32
-
-
Carzaniga, A.1
Picco, G.P.2
Vigna, G.3
-
4
-
-
0029392001
-
Itinerant agents for mobile computing
-
D. M. Chess, B. Grosof, C. G. Harrison, D. Levine, C. Parris, and G. Tsudik. Itinerant agents for mobile computing. IEEE Personal Communications, 2(3):34-49, October 1995.
-
(1995)
IEEE Personal Communications
, vol.2
, Issue.3
, pp. 34-49
-
-
Chess, D.M.1
Grosof, B.2
Harrison, C.G.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
9
-
-
84955594169
-
-
Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes in Computer Science
-
C. G. Harrison, D. M. Chess, and A. Kershenbaum. Mobile agents: Are they a good idea? In Mobile Object Systems: Towards the Programmable Internet, volume 1222 of Lecture Notes in Computer Science, pages 25-47. Springer Verlag, 1997.
-
(1997)
Mobile Agents: Are they a Good Idea?
-
-
Harrison, C.G.1
Chess, D.M.2
Kershenbaum, A.3
-
10
-
-
21844460907
-
-
ITU. ITU-T Recommendation X.509: The Directory-Authentication Framework
-
ITU. ITU-T Recommendation X.509: The Directory-Authentication Framework. International Telecommunication Union, 1993.
-
(1993)
International Telecommunication Union
-
-
-
14
-
-
0041915631
-
-
RSA Data Security, Inc
-
RSA Data Security, Inc. PKCS #1: RSA Encryption Standard. RSA Data Security, Inc., November 1993.
-
(1993)
PKCS #1: RSA Encryption Standard
-
-
-
15
-
-
85030463467
-
A formal approach to security architectures
-
Brighton, England
-
R. A. Rueppel. A formal approach to security architectures. In EuroCrypt, pages 387-398, Brighton, England, 1991.
-
(1991)
Eurocrypt
, pp. 387-398
-
-
Rueppel, R.A.1
-
18
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
USENIX Association, Berkeley, USA
-
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the USENIX Winter 1988 Technical Conference, pages 191-202. USENIX Association, Berkeley, USA, February 1988.
-
(1988)
Proceedings of the USENIX Winter 1988 Technical Conference
, pp. 191-202
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
20
-
-
84982872741
-
-
New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996
-
New York Times. U.S. workers stole data on 11,000, agency says, April 6, 1996.
-
-
-
-
25
-
-
0030405434
-
The non-technical threat to computing systems
-
I. S. Winkler. The non-technical threat to computing systems. Computing Systems, USENIX Association, 9(1):3-14, Winter 1996.
-
(1996)
Computing Systems, USENIX Association
, vol.9
, Issue.1
, pp. 3-14
-
-
Winkler, I.S.1
-
26
-
-
0026630927
-
Authentication for distributed systems
-
T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(l):39-52, January 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
|