Secure Videoconferencing
暂无分享,去创建一个
Peter Honeyman | Andy Adamson | Kevin Coffman | Jim Rees | Janani Janakiraman | Rob Jerdonek | P. Honeyman | Kevin Coffman | J. Rees | Rob Jerdonek | Andy Adamson | J. Janakiraman
[1] Silvio Micali,et al. Secret-Key Agreement without Public-Key Cryptography , 1993, CRYPTO.
[2] Gustavus J. Simmons,et al. The Smart Card: A Standardized Security Device Dedicated to Public Cryptology , 1992 .
[3] John K. Ousterhout,et al. An X11 Toolkit Based on the Tcl Language , 1991, USENIX Winter.
[4] Mihir Bellare,et al. Provably secure session key distribution: the three party case , 1995, STOC '95.
[5] Silvio Micali,et al. Secret-key agreement without public-key , 1994, CRYPTO 1994.
[6] Ken Thompson,et al. Password security: a case history , 1979, CACM.
[7] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[8] Tim Howes,et al. Lightweight Directory Access Protocol , 1995, RFC.
[9] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[10] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[11] Zvi Galil,et al. Explicit Constructions of Linear-Sized Superconcentrators , 1981, J. Comput. Syst. Sci..
[12] Steven M. Bellovin,et al. Limitations of the Kerberos authentication system , 1990, CCRV.
[13] John Linn,et al. Generic Security Service Application Program Interface , 1993, RFC.
[14] Daniel Klein,et al. Foiling the cracker: A survey of, and improvements to, password security , 1992 .
[15] David M'Raïhi,et al. Arithmetic co-processors for public-key cryptography: The state of the art , 1996, CARDIS.
[16] Victor Shoup,et al. Session Key Distribution Using Smart Cards , 1996, EUROCRYPT.
[17] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[18] Atul Prakash,et al. Flexible control of downloaded executable content , 1999, TSEC.
[19] Louis Guillou,et al. The smart card: A standardized security device dedicated to public cryptology , 1992 .
[20] John Linn,et al. Generic Security Service Application Program Interface, Version 2 , 1997, RFC.
[21] Steven McCanne,et al. vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.
[22] Jeffrey I. Schiller,et al. An Authentication Service for Open Network Systems. In , 1998 .
[23] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[24] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[25] Jean-Jacques Quisquater,et al. FAME: A 3rd Generation Coprocessor for Optimising Public Key Cryptosystems in Smart Card Applications , 1996, CARDIS.
[26] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.