메뉴 건너뛰기




Volumn , Issue , 1996, Pages

Enclaves: Enabling secure collaboration over the internet

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN AND IMPLEMENTATIONS; HOME OFFICE; MOBILE USERS; RAPID EXPANSION; REAL TIME INTERACTIONS; VIRTUAL SUBNET;

EID: 85084162284     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (16)
  • 1
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • November
    • R.J. Anderson. Why Cryptosystems Fail. Communications of the ACM, 37(11):32-40, November 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.J.1
  • 3
    • 0027810202 scopus 로고
    • The process group approach to reliable distributed computing
    • 103, December
    • K.P. Birman. The Process Group Approach to Reliable Distributed Computing. Communications of the ACM, 36(12):37-53/103, December 1993.
    • (1993) Communications of the ACM , vol.36 , Issue.12 , pp. 37-53
    • Birman, K.P.1
  • 6
    • 0003801918 scopus 로고
    • Host extensions for IP multicasting
    • Internet Network Working Group, August
    • S. Deering. Host Extensions for IP Multicasting. Request for Comments 1112, Internet Network Working Group, August 1989.
    • (1989) Request for Comments 1112
    • Deering, S.1
  • 7
    • 0028485511 scopus 로고
    • MBONE: The multicast backbone
    • August
    • H. Eriksson. MBONE: The Multicast Backbone. Communications of the ACM, 37(8):54-60, August 1994.
    • (1994) Communications of the ACM , vol.37 , Issue.8 , pp. 54-60
    • Eriksson, H.1
  • 8
    • 0029531472 scopus 로고
    • Optimal authentication protocols resistant to password guessing attacks
    • County Kerry, Ireland, June
    • L. Gong. Optimal Authentication Protocols Resistant to Password Guessing Attacks. In Proceedings of the 8th IEEE Computer Security Foundations Workshop, pages 24-29, County Kerry, Ireland, June 1995.
    • (1995) Proceedings of the 8th IEEE Computer Security Foundations Workshop , pp. 24-29
    • Gong, L.1
  • 9
    • 0000367158 scopus 로고
    • Multicast security and its extension to a mobile environment
    • October
    • L. Gong and N. Shacham. Multicast Security and Its Extension to a Mobile Environment. ACM-Baltzer Journal of Wireless Networks, 1(3):281-295, October 1995.
    • (1995) ACM-Baltzer Journal of Wireless Networks , vol.1 , Issue.3 , pp. 281-295
    • Gong, L.1    Shacham, N.2
  • 10
    • 0347470584 scopus 로고
    • Fail-stop protocols: An approach to designing secure protocols
    • Dependable Computing and Fault-Tolerant Systems Urbana-Champaign, Illinois, September Springer-Verlag
    • L. Gong and P. Syverson. Fail-Stop Protocols: An Approach to Designing Secure Protocols. In Proceedings of the 5th IFIP Working Conference on Dependable Computing for Critical Applications, Dependable Computing and Fault-Tolerant Systems, pages 44-55, Urbana-Champaign, Illinois, September 1995. Springer-Verlag.
    • (1995) Proceedings of the 5th IFIP Working Conference on Dependable Computing for Critical Applications , pp. 44-55
    • Gong, L.1    Syverson, P.2
  • 11
    • 0027557372 scopus 로고
    • Issues in the design of a toolkit for supporting multiple group editors
    • Spring
    • M. Knister and A. Prakash. Issues in the Design of a Toolkit for Supporting Multiple Group editors. Computing Systems, 6(2):135-166, Spring 1993.
    • (1993) Computing Systems , vol.6 , Issue.2 , pp. 135-166
    • Knister, M.1    Prakash, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.