메뉴 건너뛰기




Volumn , Issue , 2003, Pages 57-70

Protecting applications with transient authentication

Author keywords

[No Author keywords available]

Indexed keywords

HARDWARE TOKENS; MEMORY STATE; MOZILLA; TRANSIENT AUTHENTICATION; UBIQUITOUS SYSTEMS; WIRELESS LINK;

EID: 85025685351     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1066116.1066117     Document Type: Conference Paper
Times cited : (36)

References (36)
  • 2
    • 85084163095 scopus 로고
    • Key management in an encrypting file system
    • Boston, MA, June
    • M. Blaze. Key management in an encrypting file system. In Proceedings of the Summer 1994 USENIX Conference, pages 27-35, Boston, MA, June 1994.
    • (1994) Proceedings of the Summer 1994 USENIX Conference , pp. 27-35
    • Blaze, M.1
  • 4
    • 84976295016 scopus 로고
    • Distance-bounding protocols
    • Proceedings of EUROCRYPT '93. Springer-Verlag
    • S. Brands and D. Chaum. Distance-bounding protocols. In Proceedings of EUROCRYPT '93, Lecture Notes in Computer Science, no. 765, pages 344-359. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , Issue.765 , pp. 344-359
    • Brands, S.1    Chaum, D.2
  • 13
    • 85028600252 scopus 로고    scopus 로고
    • Ensure Technologies, Ann Arbor, Michigan
    • Ensure Technologies, Ann Arbor, Michigan.
  • 15
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • San Jose, CA, July
    • P. Gutmann. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the 6th USENIX Security Symposium, pages 77-89, San Jose, CA, July 1996.
    • (1996) Proceedings of the 6th USENIX Security Symposium , pp. 77-89
    • Gutmann, P.1
  • 17
    • 0019634370 scopus 로고
    • Password authentication with insecure communication
    • November
    • L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-72, November 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 23
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • December
    • R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-9, December 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 26
    • 0003928877 scopus 로고
    • National Institute of Standards and Technology. FIPS Publication #113, May
    • National Institute of Standards and Technology. Computer data authentication. FIPS Publication #113, May 1985.
    • (1985) Computer Data Authentication
  • 27
    • 0033888070 scopus 로고    scopus 로고
    • An introduction to evaluating biometric systems
    • February
    • P. J. Phillips, A. Martin, C. L.Wilson, and M. Przybocki. An introduction to evaluating biometric systems. IEEE Computer, 33(2):56-63, February 2000.
    • (2000) IEEE Computer , vol.33 , Issue.2 , pp. 56-63
    • Phillips, P.J.1    Martin, A.2    Wilson, C.L.3    Przybocki, M.4
  • 29
    • 85028581846 scopus 로고    scopus 로고
    • RSA Security Bedford Massachusetts
    • RSA Security, Bedford, Massachusetts.
  • 34
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Security Protocols, 7th International Workshop Proceedings
    • F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999.
    • (1999) Lecture Notes in Computer Science
    • Stajano, F.1    Anderson, R.2
  • 36
    • 85084164692 scopus 로고    scopus 로고
    • SSH - Secure login connections over the Internet
    • San Jose, CA, July
    • T. Ylonen. SSH - Secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37-42, San Jose, CA, July 1996.
    • (1996) Proceedings of the 6th USENIX Security Symposium , pp. 37-42
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.