Sciweavers

9 search results - page 1 / 2
» esorics 1994
Sort
View
ESORICS
1994
Springer
14 years 1 months ago
Authentication via Multi-Service Tickets in the Kuperee Server
Thomas Hardjono, Jennifer Seberry
ESORICS
1994
Springer
14 years 1 months ago
Beacon Based Authentication
Azad Jiwa, Jennifer Seberry, Yuliang Zheng
ESORICS
1994
Springer
14 years 1 months ago
Non-Interference Through Determinism
A. W. Roscoe, Jim Woodcock, L. Wulf
ESORICS
1994
Springer
14 years 1 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson
ESORICS
1994
Springer
14 years 1 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen