-
1
-
-
85028758651
-
A family of light-weight protocols for authentication and key distribution
-
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. A family of light-weight protocols for authentication and key distribution. Submitted to IEEE T. Networking, 1993.
-
(1993)
IEEE T. Networking
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
2
-
-
0027617333
-
Systematic design of a family of attack-resistant authentication protocols
-
June, Special issue on Secure Communications. See also a different version in Crypto 91
-
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of a family of attack-resistant authentication protocols. IEEE Journal on Selected Areas in Communications, 11(5):679–693, June 1993. Special issue on Secure Communications. See also a different version in Crypto 91.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 679-693
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
3
-
-
0027741529
-
Augmented encrypted key exchange: A password based protocol secure against dictionary attacks and password file compromise
-
November
-
Steven M. Bellovin and Michael Merritt. Augmented encrypted key exchange: a password based protocol secure against dictionary attacks and password file compromise. In 1st ACM Conference on Computer and Communications Security, pages 244–250, November 1993.
-
(1993)
1St ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
5
-
-
85028760121
-
A reconstructible proactive pseudorandomness protocol
-
June
-
Chee-Seng Chow and Amir Herzberg. A reconstructible proactive pseudorandomness protocol. Work in progress, June 1994.
-
(1994)
Work in Progress
-
-
Chow, C.-S.1
Herzberg, A.2
-
6
-
-
0024663403
-
With microscope and tweezers: An analysis of the internet virus of november 1988
-
M. Elchin and J. Rochlis. With microscope and tweezers: An analysis of the internet virus of november 1988. In IEEE Symp. on Security and Privacy, pages 326–343, 1989.
-
(1989)
IEEE Symp. on Security and Privacy
, pp. 326-343
-
-
Elchin, M.1
Rochlis, J.2
-
8
-
-
0027805770
-
Eavesdropping games: A graph-theoretic approach to privacy in distributed systems
-
November
-
Mat Franklin and Moti Yung. Eavesdropping games: A graph-theoretic approach to privacy in distributed systems. In 34th Annual Symposium on Foundations of Computer Science, pages 670–679, November 1993.
-
(1993)
34Th Annual Symposium on Foundations of Computer Science
, pp. 670-679
-
-
Franklin, M.1
Yung, M.2
-
9
-
-
85028763214
-
Reaching (And maintaining) agreement in the presence of mobile faults
-
Juan A. Garay. Reaching (and maintaining) agreement in the presence of mobile faults. To be presented in WDAG, 1994.
-
(1994)
To Be Presented in WDAG
-
-
Garay, J.A.1
-
11
-
-
0022793132
-
How to construct random functions
-
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to construct random functions. J. ACM, 33(4):792–807, 1986. Extended abstract in FOCS84.
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
12
-
-
84858394565
-
-
Manuscript, see preliminary versions by Impagliazzo et al. in 21st STOC and Hästad in 22nd STOC
-
John Hästad, Russell Impagliazzo, Leonid Levin, and Mike Luby. Construction of pseudo-random generator from any one-way functions. Manuscript, see preliminary versions by Impagliazzo et al. in 21st STOC and Hästad in 22nd STOC, 1993.
-
(1993)
Construction of Pseudo-Random Generator from Any One-Way Functions
-
-
Hästad, J.1
Impagliazzo, R.2
Levin, L.3
Luby, M.4
-
13
-
-
0027544247
-
Beyond preliminary analysis of the wank and oilz worms: A case of study of malicious code
-
Thomas A. Longstaff and Schultz E. Eugene. Beyond preliminary analysis of the wank and oilz worms: A case of study of malicious code. Computers and Security, 12(1):61–77, 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.1
, pp. 61-77
-
-
Longstaff, T.A.1
Eugene, S.E.2
-
15
-
-
0018543411
-
Unix password security
-
R. H. Morris and K. Thompson. Unix password security. Comm. ACM, 22(11):594–597, November 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.H.1
Thompson, K.2
-
16
-
-
85027164480
-
How to withstand mobile virus attacks
-
Montreal, Quebec, Canada
-
Rafail Ostrovsky and Moti Yung. How to withstand mobile virus attacks. In Proceedings of the 10 th Annual ACM Symposium on Principles of Distributed Computing, Montreal, Quebec, Canada, pages 51–59, 1991.
-
(1991)
Proceedings of the 10 Th Annual ACM Symposium on Principles of Distributed Computing
, pp. 51-59
-
-
Ostrovsky, R.1
Yung, M.2
-
17
-
-
0020495044
-
A new solution to the byzantine generals problem
-
R. Reischuk. A new solution to the byzantine generals problem. Information and Control, pages 23–42, 1985.
-
(1985)
Information and Control
, pp. 23-42
-
-
Reischuk, R.1
-
18
-
-
0024130658
-
How secure are computers in the u.S.a.?
-
Cliff Stoll. How secure are computers in the u.s.a.? Computers and Security, 7(6):543–547, 1988
-
(1988)
Computers and Security
, vol.7
, Issue.6
, pp. 543-547
-
-
Stoll, C.1
|