메뉴 건너뛰기




Volumn , Issue , 2002, Pages

Security in plan 9

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; NETWORK ARCHITECTURE;

EID: 85084163882     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (25)

References (20)
  • 2
    • 84937550984 scopus 로고    scopus 로고
    • Provably secure Password-Authenticated key exchange using Diffie-Hellman
    • Victor Boyko, Philip MacKenzie, and Sarvar Patel, "Provably Secure Password-Authenticated Key Exchange using Diffie-Hellman," Eurocrypt 2000, 156-171.
    • (2000) Eurocrypt , pp. 156-171
    • Boyko, V.1    MacKenzie, P.2    Patel, S.3
  • 4
    • 84949637273 scopus 로고    scopus 로고
    • Server-assisted generation of a strong secret from a password
    • National Institute of Standards and Technology (NIST), Gaithersburg MD, June 14 16
    • Warwick Ford and Burton S. Kaliski, Jr., "Server-Assisted Generation of a Strong Secret from a Password," IEEE Fifth International Workshop on Enterprise Security, National Institute of Standards and Technology (NIST), Gaithersburg MD, June 14 - 16, 2000.
    • (2000) IEEE Fifth International Workshop on Enterprise Security
    • Ford, W.1    Kaliski, B.S.2
  • 7
    • 85077625794 scopus 로고    scopus 로고
    • Philip MacKenzie, private communication
    • Philip MacKenzie, private communication.
  • 12
    • 0005025933 scopus 로고
    • The use of name spaces in plan 9
    • April reprinted from Proceedings of the 5th ACM SIGOPS European Workshop, Mont Saint-Michel, 1992, Paper nº34
    • Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, Phil Winterbottom, "The Use of Name Spaces in Plan 9," Operating Systems Review, 27, 2, April 1993, pp. 72-76 (reprinted from Proceedings of the 5th ACM SIGOPS European Workshop, Mont Saint-Michel, 1992, Paper nº34).
    • (1993) Operating Systems Review , vol.27 , Issue.2 , pp. 72-76
    • Pike, R.1    Presotto, D.2    Thompson, K.3    Trickey, H.4    Winterbottom, P.5
  • 18
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, Texas, February
    • Jennifer G. Steiner, Clifford Neumann, and Jeffrey I. Schiller, "Kerberos: An Authentication Service for Open Network Systems," Proceedings of USENIX Winter Conference, Dallas, Texas, February 1988, pp. 191-202.
    • (1988) Proceedings of USENIX Winter Conference , pp. 191-202
    • Steiner, J.G.1    Neumann, C.2    Schiller, J.I.3
  • 20
    • 85084164692 scopus 로고    scopus 로고
    • SSH ― Secure login connections over the internet
    • San Jose, CA, July
    • Ylonen, T., "SSH―Secure Login Connections Over the Internet," 6th USENIX Security Symposium, pp. 37-42. San Jose, CA, July 1996.
    • (1996) 6th USENIX Security Symposium , pp. 37-42
    • Ylonen, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.