-
2
-
-
84937550984
-
Provably secure Password-Authenticated key exchange using Diffie-Hellman
-
Victor Boyko, Philip MacKenzie, and Sarvar Patel, "Provably Secure Password-Authenticated Key Exchange using Diffie-Hellman," Eurocrypt 2000, 156-171.
-
(2000)
Eurocrypt
, pp. 156-171
-
-
Boyko, V.1
MacKenzie, P.2
Patel, S.3
-
4
-
-
84949637273
-
Server-assisted generation of a strong secret from a password
-
National Institute of Standards and Technology (NIST), Gaithersburg MD, June 14 16
-
Warwick Ford and Burton S. Kaliski, Jr., "Server-Assisted Generation of a Strong Secret from a Password," IEEE Fifth International Workshop on Enterprise Security, National Institute of Standards and Technology (NIST), Gaithersburg MD, June 14 - 16, 2000.
-
(2000)
IEEE Fifth International Workshop on Enterprise Security
-
-
Ford, W.1
Kaliski, B.S.2
-
7
-
-
85077625794
-
-
Philip MacKenzie, private communication
-
Philip MacKenzie, private communication.
-
-
-
-
8
-
-
0042352260
-
Separating key management from file system security
-
David Mazières, Michael Kaminsky, M. Frans Kaashoek and Emmett Witchel, "Separating key management from file system security," Symposium on Operating Systems Principles, 1999, pp. 124-139.
-
(1999)
Symposium on Operating Systems Principles
, pp. 124-139
-
-
Mazières, D.1
Kaminsky, M.2
Frans Kaashoek, M.3
Witchel, E.4
-
11
-
-
0001300585
-
Plan 9 from bell labs
-
Summer
-
Rob Pike, Dave Presotto, Sean Dorward, Bob Flandrena, Ken Thompson, Howard Trickey, and Phil Winterbottom, "Plan 9 from Bell Labs," Computing Systems, 8, 3, Summer 1995, pp. 221-254.
-
(1995)
Computing Systems
, vol.8
, Issue.3
, pp. 221-254
-
-
Pike, R.1
Presotto, D.2
Dorward, S.3
Flandrena, B.4
Thompson, K.5
Trickey, H.6
Winterbottom, P.7
-
12
-
-
0005025933
-
The use of name spaces in plan 9
-
April reprinted from Proceedings of the 5th ACM SIGOPS European Workshop, Mont Saint-Michel, 1992, Paper nº34
-
Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, Phil Winterbottom, "The Use of Name Spaces in Plan 9," Operating Systems Review, 27, 2, April 1993, pp. 72-76 (reprinted from Proceedings of the 5th ACM SIGOPS European Workshop, Mont Saint-Michel, 1992, Paper nº34).
-
(1993)
Operating Systems Review
, vol.27
, Issue.2
, pp. 72-76
-
-
Pike, R.1
Presotto, D.2
Thompson, K.3
Trickey, H.4
Winterbottom, P.5
-
14
-
-
0003535506
-
-
RFC2138, April
-
C. Rigney, A. Rubens, W. Simpson, S. Willens, "Remote Authentication Dial In User Service (RADIUS)," RFC2138, April 1997.
-
(1997)
Remote Authentication Dial in User Service (RADIUS)
-
-
Rigney, C.1
Rubens, A.2
Simpson, W.3
Willens, S.4
-
18
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Dallas, Texas, February
-
Jennifer G. Steiner, Clifford Neumann, and Jeffrey I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Proceedings of USENIX Winter Conference, Dallas, Texas, February 1988, pp. 191-202.
-
(1988)
Proceedings of USENIX Winter Conference
, pp. 191-202
-
-
Steiner, J.G.1
Neumann, C.2
Schiller, J.I.3
-
19
-
-
85180527787
-
The secure remote password protocol
-
San Diego, CA, March
-
T. Wu, "The Secure Remote Password Protocol," Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium, San Diego, CA, March 1998, pp. 97-111.
-
(1998)
Proceedings of the 1998 Internet Society Network and Distributed System Security Symposium
, pp. 97-111
-
-
Wu, T.1
-
20
-
-
85084164692
-
SSH ― Secure login connections over the internet
-
San Jose, CA, July
-
Ylonen, T., "SSH―Secure Login Connections Over the Internet," 6th USENIX Security Symposium, pp. 37-42. San Jose, CA, July 1996.
-
(1996)
6th USENIX Security Symposium
, pp. 37-42
-
-
Ylonen, T.1
|