You are here

Bibliography

Export 5 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is authentication  [Clear All Filters]
2011
Henry R, Goldberg I. Formalizing Anonymous Blacklisting Systems. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy. Proceedings of the 2011 IEEE Symposium on Security and Privacy. San Francisco, CA, USA; 2011.
2008
Holz R, Niedermayer H, Hauck P, Carle G. Trust-Rated Authentication for Domain-Structured Distributed Systems. In: EuroPKI '08: Proceedings of the 5th European PKI workshop on Public Key Infrastructure. EuroPKI '08: Proceedings of the 5th European PKI workshop on Public Key Infrastructure. Berlin, Heidelberg: Springer-Verlag; 2008. pp. 74–88. Available from: http://www.springerlink.com/content/k6786282r5378k42/
2006
Thiele M, Kutzner K, Fuhrmann T. Churn Resistant de Bruijn Networks for Wireless on Demand Systems. In: Proceedings of the Third Annual Conference on Wireless On demand Network Systems and Services. Proceedings of the Third Annual Conference on Wireless On demand Network Systems and Services. Les Ménuires, France; 2006. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Brands S. Secure User Identification Without Privacy Erosion. University of Ottawa Law & Technology Journal [Internet]. 2006 ;3:205–223. Available from: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999695