Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Morgan Stanley's Aurora System: Designing a Next Generation Global Production Unix Environment
LISA '95 Proceedings of the 9th USENIX conference on System administration
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are ...