-
2
-
-
85084163095
-
Key management in an encrypting file system
-
Boston, MA, June
-
M. Blaze. Key management in an encrypting file system. In Proceedings of the Summer 1994 USENIX Conference, pages 27-35, Boston, MA, June 1994.
-
(1994)
Proceedings of the Summer 1994 USENIX Conference
, pp. 27-35
-
-
Blaze, M.1
-
4
-
-
84976295016
-
Distance-bounding protocols
-
Proceedings of EUROCRYPT '93. Springer-Verlag
-
S. Brands and D. Chaum. Distance-bounding protocols. In Proceedings of EUROCRYPT '93, Lecture Notes in Computer Science, no. 765, pages 344-359. Springer-Verlag, 1993.
-
(1993)
Lecture Notes in Computer Science
, Issue.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
5
-
-
0025386404
-
A logic of authentication
-
February
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
85084160243
-
Stackguard: Automatic adaptive detection and prevention of buffer overflow attacks
-
San Antonio, TX, January
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer overflow attacks. In Proceedings of the Seventh USENIX Security Symposium, pages 63-77, San Antonio, TX, January 1998.
-
(1998)
Proceedings of the Seventh USENIX Security Symposium
, pp. 63-77
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
10
-
-
84957086893
-
How to forget a secret
-
Trier, Germany, March
-
G. Di Crescenzo, N. Ferguson, R. Impagliazzo, M. Jakobsson, C. Meinel, and S. Tison. How to forget a secret. In Proceedings of the 16th Annual Symposium on Theoretical Aspects in Computer Science, pages 500-509, Trier, Germany, March 1999.
-
(1999)
Proceedings of the 16th Annual Symposium on Theoretical Aspects in Computer Science
, pp. 500-509
-
-
Di Crescenzo, G.1
Ferguson, N.2
Impagliazzo, R.3
Jakobsson, M.4
Meinel, C.5
Tison, S.6
-
12
-
-
0035474388
-
Building the IBM 4758 secure coprocessor
-
October
-
J. Dyer, M. Lindemann, R. Perez, R. Sailer, S.W. Smith, L. van Doorn, and S. Weingart. Building the IBM 4758 secure coprocessor. IEEE Computer, 34(10):57-66, October 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.10
, pp. 57-66
-
-
Dyer, J.1
Lindemann, M.2
Perez, R.3
Sailer, R.4
Smith, S.W.5
Van Doorn, L.6
Weingart, S.7
-
13
-
-
85028600252
-
-
Ensure Technologies, Ann Arbor, Michigan
-
Ensure Technologies, Ann Arbor, Michigan.
-
-
-
-
15
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
San Jose, CA, July
-
P. Gutmann. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the 6th USENIX Security Symposium, pages 77-89, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 77-89
-
-
Gutmann, P.1
-
17
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
L. Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-72, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
21
-
-
85028619434
-
Personal secure booting
-
Syndney, Australia, July
-
W. A. Arbaugh N. Itoi, J. Pollack S, and D. M. Reeves. Personal secure booting. In Proceedings of ACISP 2001, Syndney, Australia, July 2001.
-
(2001)
Proceedings of ACISP 2001
-
-
Arbaugh, W.A.1
Itoi, N.2
Pollack, J.S.3
Reeves, D.M.4
-
23
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-9, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
24
-
-
0033906326
-
An iris biometric system for public and personal use
-
February
-
M. Negin, T. A. Chemielewski Jr., M. Salganicoff, T. A. Camus, U. M. Cahn von Seelen, P. L. Venetianer, and G. G. Zhang. An iris biometric system for public and personal use. IEEE Computer, 33(2):70-5, February 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.2
, pp. 70-75
-
-
Negin, M.1
Chemielewski, T.A.2
Salganicoff, M.3
Camus, T.A.4
Seelen Von Cahn, U.M.5
Venetianer, P.L.6
Zhang, G.G.7
-
26
-
-
0003928877
-
-
National Institute of Standards and Technology. FIPS Publication #113, May
-
National Institute of Standards and Technology. Computer data authentication. FIPS Publication #113, May 1985.
-
(1985)
Computer Data Authentication
-
-
-
27
-
-
0033888070
-
An introduction to evaluating biometric systems
-
February
-
P. J. Phillips, A. Martin, C. L.Wilson, and M. Przybocki. An introduction to evaluating biometric systems. IEEE Computer, 33(2):56-63, February 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.2
, pp. 56-63
-
-
Phillips, P.J.1
Martin, A.2
Wilson, C.L.3
Przybocki, M.4
-
29
-
-
85028581846
-
-
RSA Security Bedford Massachusetts
-
RSA Security, Bedford, Massachusetts.
-
-
-
-
34
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Security Protocols, 7th International Workshop Proceedings
-
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In Security Protocols, 7th International Workshop Proceedings, Lecture Notes in Computer Science, 1999.
-
(1999)
Lecture Notes in Computer Science
-
-
Stajano, F.1
Anderson, R.2
-
36
-
-
85084164692
-
SSH - Secure login connections over the Internet
-
San Jose, CA, July
-
T. Ylonen. SSH - Secure login connections over the Internet. In Proceedings of the 6th USENIX Security Symposium, pages 37-42, San Jose, CA, July 1996.
-
(1996)
Proceedings of the 6th USENIX Security Symposium
, pp. 37-42
-
-
Ylonen, T.1
|