Simple public-key infrastructure

Results: 43



#Item
1Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Delegation Logic: A Logic-based Approach to Distributed Authorization NINGHUI LI Stanford University BENJAMIN N. GROSOF Massachusetts Institute of Technology

Add to Reading List

Source URL: cs-www.cs.yale.edu

Language: English - Date: 2002-12-29 15:33:54
2POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1  Dan S. Wallach1

POST: A Secure, Resilient, Cooperative Messaging System Alan Mislove1 Ansley Post1 Dan S. Wallach1

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2003-04-12 02:53:53
3Journal of Computer Security–322 IOS Press 285  Certificate chain discovery in SPKI/SDSI

Journal of Computer Security–322 IOS Press 285 Certificate chain discovery in SPKI/SDSI

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2016-07-18 22:33:05
4A Logic for Analysing Subterfuge in Delegation Chains Hongbin Zhou and Simon N. Foley Department of Computer Science, University College Cork, Ireland. {zhou,s.foley}@cs.ucc.ie

A Logic for Analysing Subterfuge in Delegation Chains Hongbin Zhou and Simon N. Foley Department of Computer Science, University College Cork, Ireland. {zhou,s.foley}@cs.ucc.ie

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-08-04 06:41:57
5A Framework for Establishing Decentralized Secure Coalitions Hongbin Zhou Computer Science Department University College Cork, Ireland

A Framework for Establishing Decentralized Secure Coalitions Hongbin Zhou Computer Science Department University College Cork, Ireland

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2006-07-28 07:10:47
6Authorisation Subterfuge by Delegation in Decentralised Networks Simon Foley and Hongbin Zhou Department of Computer Science, University College, Cork, Ireland. ,

Authorisation Subterfuge by Delegation in Decentralised Networks Simon Foley and Hongbin Zhou Department of Computer Science, University College, Cork, Ireland. ,

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2005-06-02 09:03:03
7Secure Naming for Distributed Computing using the Condensed Graph Model by Thomas Brendan Brabants Quillinan, B.Eng., M.Sc.

Secure Naming for Distributed Computing using the Condensed Graph Model by Thomas Brendan Brabants Quillinan, B.Eng., M.Sc.

Add to Reading List

Source URL: www.cs.ucc.ie

Language: English - Date: 2007-10-09 07:25:53
8Noname manuscript No. (will be inserted by the editor) Understanding SPKI/SDSI Using First-Order Logic ? Ninghui Li1?? John C. Mitchell2 1

Noname manuscript No. (will be inserted by the editor) Understanding SPKI/SDSI Using First-Order Logic ? Ninghui Li1?? John C. Mitchell2 1

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-17 01:13:36
9Hashing / Search algorithms / MD5 / X.509 / Simple public key infrastructure / Hash function / HMAC / Cryptographic hash function / Crypt / Cryptography / Public-key cryptography / Key management

Pisces User Manual Release 1.0 alpha 1 Jeremy Hylton April 27, 2000 Corporation for National Research Initiatives

Add to Reading List

Source URL: www.cnri.reston.va.us

Language: English - Date: 2013-05-09 14:48:28
10Certification Infrastructure Needs For Electronic Commerce And Personal Use Carl M. Ellison1 16 July 1997

Certification Infrastructure Needs For Electronic Commerce And Personal Use Carl M. Ellison1 16 July 1997

Add to Reading List

Source URL: theworld.com

Language: English - Date: 2001-09-29 11:54:29