„network coding“
Suchergebnisse
3.793 Treffer
-
Two-party generation of DSA signatures
-
Certificate revocation system implementation based on the Merkle hash tree
-
Preface to the special issue on PKI
-
All sail, no anchor II: Acceptable high-end PKI
-
PKI design based on the use of on-line certification authorities
-
Theory and benefits of recursive certificate structures
-
Generating visible RSA public keys for PKI
-
Edit automata: enforcement mechanisms for run-time security policies
-
Static use-based object confinement
-
Rigorous automated network security management
-
An overview of the verification of SET
-
Game strategies in network security
-
Detection of file-based race conditions
-
On the sequence of authorization policy transformations
-
Preface to the special issue on ESORICS 2003
-
Symmetric authentication in a simulatable Dolev–Yao-style cryptographic library
-
Analyzing SLE 88 memory management security using Interacting State Machines
-
Passive-attack analysis for connection-based anonymity systems
-
Techniques for improving the security and manageability of IPsec policy
-
Protocols useful on the Internet from distributed signature schemes