Provably Secure Videoconferencing
暂无分享,去创建一个
Peter Honeyman | Andy Adamson | Kevin Coffman | Jim Rees | Janani Janakiraman | Rob Jerdonek | P. Honeyman | Kevin Coffman | J. Rees | Rob Jerdonek | Andy Adamson | J. Janakiraman
[1] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[2] John K. Ousterhout,et al. An X11 Toolkit Based on the Tcl Language , 1991, USENIX Winter.
[3] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[4] John Linn,et al. Generic Security Service Application Program Interface , 1993, RFC.
[5] Zvi Galil,et al. Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..
[6] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[7] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[8] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[9] Steven McCanne,et al. vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.
[10] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[11] Gustavus J. Simmons,et al. The Smart Card: A Standardized Security Device Dedicated to Public Cryptology , 1992 .
[12] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[13] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[14] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[15] David M'Raïhi,et al. Arithmetic co-processors for public-key cryptography: The state of the art , 1996, CARDIS.
[16] Jean-Jacques Quisquater,et al. FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications , 1996, CARDIS.
[17] Victor Shoup,et al. Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.
[18] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[19] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[20] Tim Howes,et al. Lightweight Directory Access Protocol , 1995, RFC.
[21] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[22] Atul Prakash,et al. Flexible control of downloaded executable content , 1999, TSEC.
[23] John Linn,et al. Generic Security Service Application Program Interface, Version 2 , 1997, RFC.