Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Using encryption for authentication in large networks of computers
Communications of the ACM
Security defects in CCITT recommendation X.509: the directory authentication framework
ACM SIGCOMM Computer Communication Review
Authentication in distributed systems: theory and practice
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Communications of the ACM
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
A new approach to DNS security (DNSSEC)
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Role-based security for distributed object systems
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Token-mediated certification and electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Kerberos plus RSA for world wide web security
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
On the performance and analysis of DNS security extensions
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Secure end-to-end delegations in distributed systems
Computer Communications
Authorization with security attributes and privilege delegation
Computer Communications
Hi-index | 0.02 |
We present some practical security protocols that use private-key encryption in the public-key style. Our system combines a new notion of private-key certificates, a simple key-translation protocol, and key-distribution. These certificates can be administered and used much as public-key certificates are, so that users can communicate securely while sharing neither an encryption key nor a network connection.