-
2
-
-
85077735542
-
-
Allaire Corporation. Personal Communication, January 2001
-
Allaire Corporation. Personal Communication, January 2001.
-
-
-
-
3
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Hugo Krawczyk, editor Santa Barbara, CA Springer-Verlag
-
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations among notions of security for public-key encryption schemes. In Hugo Krawczyk, editor, Proceedings of Advances in Cryptology - CRYPTO 98, Volume 1462 of Lecture Notes in Computer Science, pages 26-45, Santa Barbara, CA, 1998. Springer-Verlag.
-
(1998)
Proceedings of Advances in Cryptology - CRYPTO 98, Volume 1462 of Lecture Notes in Computer Science
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
4
-
-
0004304523
-
The AuthA protocol for password-based authenticated key exchange
-
March
-
Mihir Bellare and Phillip Rogaway. The AuthA protocol for password-based authenticated key exchange. Technical report, IEEE P1363, March 2000. http://grouper.ieee.org/groups/1363/StudyGroup/Passwd.html#autha.
-
(2000)
Technical Report, IEEE P1363
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Oakland, CA, May
-
Steven M. Bellovin and Michael Merritt. Encrypted key exchange: Password-based protocols secure against dictionary attacks. In Proceedings of the 1992 IEEE Symposium on Security and Privacy, pages 72-84, Oakland, CA, May 1992.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
6
-
-
85031593673
-
Secure www transactions using standard HTTP and Java applets
-
Boston, MA, September
-
F. Bergadano, B. Crispo, and M. Eccettuato. Secure www transactions using standard HTTP and Java applets. In Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pages 109-119, Boston, MA, September 1998.
-
(1998)
Proceedings of the 3rd USENIX Workshop on Electronic Commerce
, pp. 109-119
-
-
Bergadano, F.1
Crispo, B.2
Eccettuato, M.3
-
7
-
-
84937550984
-
Provably secure password authenticated key exchange using diffie-hellman
-
B. Preneel, editor Bruges, Belgium, May Springer-Verlag
-
Victor Boyko, Philip MacKenzie, and Sarvar Patel. Provably secure password authenticated key exchange using Diffie-Hellman. In B. Preneel, editor, Proceedings of Advances in Cryptology - EUROCRYPT 2000, Volume 1807 of Lecture Notes in Computer Science, Bruges, Belgium, May 2000. Springer-Verlag.
-
(2000)
Proceedings of Advances in Cryptology - EUROCRYPT 2000, Volume 1807 of Lecture Notes in Computer Science
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
10
-
-
21344487320
-
Better login protocols for computer networks
-
B. Preneel, R. Govaerts, and J. Vandewalle, editors Springer-Verlag
-
Dominique de Waleffe and Jean-Jaques Quisquater. Better login protocols for computer networks. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Proceedings of Computer Security and Industrial Cryptography, Volume 741 of Lecture Notes in Computer Science, pages 50-70. Springer-Verlag, 1993.
-
(1993)
Proceedings of Computer Security and Industrial Cryptography, Volume 741 of Lecture Notes in Computer Science
, pp. 50-70
-
-
De Waleffe, D.1
Quisquater, J.-J.2
-
11
-
-
0003286492
-
The TLS protocol version 1.0
-
Network Working Group, January
-
Tim Dierks and Christopher Allen. The TLS protocol version 1.0. RFC 2246, Network Working Group, January 1999.
-
(1999)
RFC 2246
-
-
Dierks, T.1
Allen, C.2
-
12
-
-
85028450627
-
Nonmalleable cryptography
-
New Orleans, LA
-
Danny Dolev, Cynthia Dwork, and Moni Naor. Nonmalleable cryptography. In Proceedings of the 23rd ACM Symposium on Theory of Computing, pages 542-552, New Orleans, LA, 1991.
-
(1991)
Proceedings of the 23rd ACM Symposium on Theory of Computing
, pp. 542-552
-
-
Dolev, D.1
Dwork, C.2
Naor, M.3
-
13
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public key infrastructure
-
Carl Ellison and Bruce Schneier. Ten risks of PKI: What you're not being told about public key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
14
-
-
0003415244
-
Hypertext transfer protocol - HTTP/1.1
-
Network Working Group, June
-
Roy Fielding, James Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter, Paul Leach, and Tim Berners-Lee. Hypertext Transfer Protocol - HTTP/1.1. RFC 2616, Network Working Group, June 1999.
-
(1999)
RFC 2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
15
-
-
0003629991
-
-
FIPS 180-1 U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April
-
FIPS 180-1. Secure Hash Standard. U.S. Department of Commerce/N.I.S.T., National Technical Information Service, Springfield, VA, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
16
-
-
0013194031
-
HTTP authentication: Basic and digest access authentication
-
Network Working Group, June
-
John Franks, Phillip Hallam-Baker, Jeffrey Hostetler, Scott Lawrence, Paul Leach, Ari Luotonen, and Lawrence Stewart. HTTP authentication: Basic and digest access authentication. RFC 2617, Network Working Group, June 1999.
-
(1999)
RFC 2617
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
17
-
-
85084099412
-
Fast and secure distributed read-only file system
-
San Diego, CA, October
-
Kevin Fu, M. Frans Kaashoek, and David Mazières. Fast and secure distributed read-only file system. In Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2000), pages 181-196, San Diego, CA, October 2000.
-
(2000)
Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2000)
, pp. 181-196
-
-
Fu, K.1
Frans Kaashoek, M.2
Mazières, D.3
-
18
-
-
0038684341
-
Dos and don'ts of client authentication on the web
-
May
-
Kevin Fu, Emil Sit, Kendra Smith, and Nick Feamster. Dos and don'ts of client authentication on the Web. Technical Report 818, MIT Laboratory for Computer Science, May 2001. http://www.lcs.mit.edu/.
-
(2001)
Technical Report 818, MIT Laboratory for Computer Science
-
-
Fu, K.1
Sit, E.2
Smith, K.3
Feamster, N.4
-
19
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
Shafi Goldwasser, Silvio Micali, and Ronald L. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, 17(2):281-308, April 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
21
-
-
0012625191
-
The S/KEY one-time password system
-
Network Working Group, February
-
Neil Haller. The S/KEY one-time password system. RFC 1760, Network Working Group, February 1995.
-
(1995)
RFC 1760
-
-
Haller, N.1
-
24
-
-
0003729341
-
HMAC: Keyed-hashing for message authentication
-
Network Working Group, February
-
Hugo Krawczyk, Mihir Bellare, and Ran Canetti. HMAC: Keyed-hashing for message authentication. RFC 2104, Network Working Group, February 1997.
-
(1997)
RFC 2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
25
-
-
0003533519
-
HTTP state management mechanism
-
Network Working Group, October
-
David Kristol and Lou Montulli. HTTP State Management Mechanism. RFC 2965, Network Working Group, October 2000.
-
(2000)
RFC 2965
-
-
Kristol, D.1
Montulli, L.2
-
26
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-771, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-771
-
-
Lamport, L.1
-
29
-
-
85077739509
-
-
U.S. patent Open Market, January
-
Thomas Levergood, Lawrence Stewart, Stephen Morris, Andrew Payne, and Winfield Treese. Internet server access control and monitoring systems. U.S. patent #5,708,780, Open Market, January 1998.
-
(1998)
Internet Server Access Control and Monitoring Systems
-
-
Levergood, T.1
Stewart, L.2
Morris, S.3
Payne, A.4
Treese, W.5
-
32
-
-
0009539324
-
Use of HTTP state management
-
Network Working Group, October
-
Keith Moore and Ned Freed. Use of HTTP State Management. RFC 2964, Network Working Group, October 2000.
-
(2000)
RFC 2964
-
-
Moore, K.1
Freed, N.2
-
33
-
-
0018543411
-
Password security: A case history
-
November
-
Robert Morris and Ken Thompson. Password security: A case history. Communications of the ACM, 22(11):584-597, November 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 584-597
-
-
Morris, R.1
Thompson, K.2
-
34
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. Clifford Neuman and Theodore Tso. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 33-38
-
-
Clifford Neuman, B.1
Tso, T.2
-
35
-
-
0034229770
-
Secure cookies on the web
-
July/August
-
Joon S. Park and Ravi Sandhu. Secure cookies on the Web. IEEE Internet Computing, 4(4):36-44 July/August 2000.
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.4
, pp. 36-44
-
-
Park, J.S.1
Sandhu, R.2
-
36
-
-
85077760418
-
-
Microsoft passport. http://www.passport.com/.
-
-
-
-
40
-
-
71749099572
-
-
Dug Song. dsniff. http://www.monkey.org/~dugsong/dsniff/.
-
Dsniff
-
-
Song, D.1
-
41
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, TX, February
-
Jennifer Steiner, Clifford Neuman, and Jeffrey Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the Winter 1988 USENIX, pages 191-202, Dallas, TX, February 1988.
-
(1988)
Proceedings of the Winter 1988 USENIX
, pp. 191-202
-
-
Steiner, J.1
Neuman, C.2
Schiller, J.3
-
42
-
-
69949120749
-
Unlinkable serial transactions
-
R. Hirschfeld, editor Anguilla, BWI Springer-Verlag
-
Paul Syverson, Stuart Stubblebine, and David Goldschlag. Unlinkable serial transactions. In R. Hirschfeld, editor, Proceedings of Financial Cryptography, Volume 1318 of Lecture Notes in Computer Science, Anguilla, BWI, 1997. Springer-Verlag.
-
(1997)
Proceedings of Financial Cryptography, Volume 1318 of Lecture Notes in Computer Science
-
-
Syverson, P.1
Stubblebine, S.2
Goldschlag, D.3
-
43
-
-
0022561959
-
Using sparse capabilities in a distributed system
-
Cambridge, MA
-
Andrew Tanenbaum, Sape Mullender, and Robbert van Renesse. Using sparse capabilities in a distributed system. In Proceedings of the 6th International Conference on Distributed Computing, pages 558-563, Cambridge, MA, 1986.
-
(1986)
Proceedings of the 6th International Conference on Distributed Computing
, pp. 558-563
-
-
Tanenbaum, A.1
Mullender, S.2
Van Renesse, R.3
-
44
-
-
38149033239
-
Proofs of security for the unix password hashing algorithm
-
T. Okamoto, editor Kyoto, Japan, December Springer-Verlag
-
David Wagner and Ian Goldberg. Proofs of security for the Unix password hashing algorithm. In T. Okamoto, editor, Proceedings of Advances in Cryptology - ASIACRYPT 2000, Volume 1976 of Lecture Notes in Computer Science, Kyoto, Japan, December 2000. Springer-Verlag.
-
(2000)
Proceedings of Advances in Cryptology - ASIACRYPT 2000, Volume 1976 of Lecture Notes in Computer Science
-
-
Wagner, D.1
Goldberg, I.2
-
47
-
-
85077760066
-
-
Yahoo, Inc. Personal Communication, November 2000
-
Yahoo, Inc. Personal Communication, November 2000.
-
-
-
|