-
4
-
-
77953422353
-
-
Accessed May 4th
-
M. Berman. The Programming Insider. www.mediaweek.com/mw/newsletters/ proginsider/index.jsp, Accessed May 4th, 2007.
-
(2007)
The Programming Insider
-
-
Berman, M.1
-
6
-
-
39049153474
-
Using Attribute-Based Access Control to Enable Attribute-Based Messaging
-
R. Bobba, O. Fatemieh, F. Khan, C. A. Gunter, and H. Khurana. Using Attribute-Based Access Control to Enable Attribute-Based Messaging. In Annual Computer Security Applications Conference (ACSAC), 2006.
-
(2006)
Annual Computer Security Applications Conference (ACSAC)
-
-
Bobba, R.1
Fatemieh, O.2
Khan, F.3
Gunter, C. A.4
Khurana, H.5
-
7
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
P. A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 10(3), 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
-
-
Bonatti, P. A.1
Samarati, P.2
-
12
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas. Multicast security: A taxonomy and some efficient constructions. In Proceedings of IEEE INFOCOM’99, 1999.
-
(1999)
Proceedings of IEEE INFOCOM’99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
13
-
-
0031619016
-
The Random Oracle Methodology, Revisited (Preliminary Version)
-
R. Canetti, O. Goldreich, and S. Halevi. The Random Oracle Methodology, Revisited (Preliminary Version). In STOC, pages 209-218, 1998.
-
(1998)
STOC
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
14
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
C. Cocks. An identity based encryption scheme based on quadratic residues. In IMA Int. Conf., pages 360-363, 2001.
-
(2001)
IMA Int. Conf
, pp. 360-363
-
-
Cocks, C.1
-
15
-
-
0029535788
-
Functional model of a conditional access system
-
EBU Project Group B/C/A. Winter
-
EBU Project Group B/C/A. Functional model of a conditional access system. EBU Technical Review, (266):64-77, Winter 1995.
-
(1995)
EBU Technical Review
, Issue.266
, pp. 64-77
-
-
-
18
-
-
84976736522
-
Gprof: A Call Graph Execution Profiler
-
Boston, MA, USA, June
-
S. L. Graham, P. B. Kessler, and M. K. Mckusick. Gprof: A Call Graph Execution Profiler. In Proceedings of the 1982 SIGPLAN Symposium on Compiler Construction, Boston, MA, USA, June 1982.
-
(1982)
Proceedings of the 1982 SIGPLAN Symposium on Compiler Construction
-
-
Graham, S. L.1
Kessler, P. B.2
Mckusick, M. K.3
-
23
-
-
38149054118
-
-
B. Lynn. PBC library. http://rooster.stanford.edu/~ben/pbc/, 2007.
-
(2007)
PBC library
-
-
Lynn, B.1
-
29
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
33
-
-
85180734804
-
-
Nielsens ratings for April 23 April 29
-
USA TODAY. Nielsens ratings for April 23 - April 29. http://www.usatoday.com/life/ television/news/nielsens-charts.htm, 2007.
-
(2007)
-
-
-
35
-
-
0002360030
-
Secure Group Communications Using Key Graphs
-
C. K. Wong, M. G. Gouda, and S. S. Lam. Secure Group Communications Using Key Graphs. In Proceedings of the ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communication, 1998.
-
(1998)
Proceedings of the ACM SIGCOMM Conference on Applications, technologies, architectures, and protocols for computer communication
-
-
Wong, C. K.1
Gouda, M. G.2
Lam, S. S.3
-
36
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1-42, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K. E.3
|