-
1
-
-
84901211696
-
Authentication and Delegation with Smart-cards
-
Springer-Verlag
-
Abadi, M., Burrows, M., Kaufman, C., and Lampson, B. (1991). Authentication and Delegation With Smart-cards. Theoretical Aspects of Computer Software, pages 326–345. Springer-Verlag.
-
(1991)
Theoretical Aspects of Computer Software
, pp. 326-345
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
3
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
Gong, L. (1992). A Security Risk of Depending on Synchronized Clocks. ACM Operating Systems Review, 26(1).
-
(1992)
ACM Operating Systems Review
, vol.26
, Issue.1
-
-
Gong, L.1
-
5
-
-
85029594550
-
-
PhD thesis, Informatica, University of Twente, Enschede, the Netherlands
-
Helme, A. (1997). A System for Secure User-controlled Eletronic Transactions. PhD thesis, Informatica, University of Twente, Enschede, the Netherlands.
-
(1997)
A System for Secure User-Controlled Eletronic Transactions
-
-
Helme, A.1
-
10
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., and Wobber, E. (1992). Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems, 10(4):265–310.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., and Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-key Cryptosystems. Communications of the ACM, 21(2):120–126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
15
-
-
84957697669
-
-
Technical Report CS-TR 95-21, Department of Computer Science, University of Tromsø, Norway
-
Stabell-Kulø, T. (1995). File Repository Transfer Protocol (FRTP). Technical Report CS-TR 95-21, Department of Computer Science, University of Tromsø, Norway.
-
(1995)
File Repository Transfer Protocol (FRTP)
-
-
Stabell-Kulø, T.1
-
16
-
-
0031634977
-
User controlled sharing in a variable connected distributed system
-
Stan-ford, California, USA. IEEE Computer Society
-
Stabell-Kulø, T. and Fallmyr, T. (1998). User controlled sharing in a variable connected distributed system. In Proceedings of the seventh IEEE International Workshop on Enabeling Technologies: Infrastructure for Collaborative Enterprises (WETICE’98), pages 250–255, Stan-ford, California, USA. IEEE Computer Society.
-
(1998)
Proceedings of the Seventh IEEE International Workshop on Enabeling Technologies: Infrastructure for Collaborative Enterprises (WETICE’98)
, pp. 250-255
-
-
Stabell-Kulø, T.1
Fallmyr, T.2
-
17
-
-
0001636850
-
Kerberos: An authentication system for open network systems
-
Steiner, J. G., Neumann, B. G., and Schiller, J. I. (1988). Kerberos: An Authentication System for Open Network Systems. In Proceedings of the Winter 1988 Usenix Conference, pages 191–201.
-
(1988)
Proceedings of the Winter 1988 Usenix Conference
, pp. 191-201
-
-
Steiner, J.G.1
Neumann, B.G.2
Schiller, J.I.3
-
18
-
-
84974755213
-
Knowledge, belief and semantics in the analysis of cryptographic protocols
-
IOS Press
-
Syverson, P. (1992). Knowledge, Belief and Semantics in the Analysis of Cryptographic Protocols. Journal of Computer Security, 1(3):317–334. IOS Press.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3
, pp. 317-334
-
-
Syverson, P.1
-
19
-
-
84955600081
-
n)
-
Kim, K. and Matsumoto, T., editors, Springer-Verlag
-
n). In Kim, K. and Matsumoto, T., editors, Advances in Cryptology – ASIACRYPT’91, volume 1163 of Lecture Notes in Computer Science, pages 65–76. Springer-Verlag.
-
(1996)
Advances in Cryptology – ASIACRYPT’91, Volume 1163 of Lecture Notes in Computer Science
, pp. 65-76
-
-
Win, E.D.1
Bosselaers, A.2
Vandenberghe, S.3
Gersem, P.D.4
Vandewalle, J.5
|