A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Joining security realms: a single login for netware and kerberos
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Proceedings of the 11th USENIX Security Symposium
Cerberus: A Context-Aware Security Scheme for Smart Spaces
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Storage-based intrusion detection: watching storage activity for suspicious behavior
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Mesh: secure, lightweight grid middleware using existing SSH infrastructure
Proceedings of the 12th ACM symposium on Access control models and technologies
Plan 9 authentication in Linux
ACM SIGOPS Operating Systems Review - Research and developments in the Linux kernel
XOS-SSH: a lightweight user-centric tool to support remote execution in virtual organizations
LASCO'08 First USENIX Workshop on Large-Scale Computing
NetAuth: supporting user-based network services
SS'08 Proceedings of the 17th conference on Security symposium
An SSH-based toolkit for user-based network services
LISA'09 Proceedings of the 23rd conference on Large installation system administration
Investigating the distribution of password choices
Proceedings of the 21st international conference on World Wide Web
Hi-index | 0.00 |