Toward acceptable metrics of authentication
- 22 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- Limitations on design principles for public key protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- SPX: global authentication using public key certificatesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Path independence for authentication in large-scale systemsPublished by Association for Computing Machinery (ACM) ,1997
- Modelling a public-key infrastructurePublished by Springer Nature ,1996
- Robustness Principles for Public Key ProtocolsPublished by Springer Nature ,1995
- A Faster Deterministic Maximum Flow AlgorithmJournal of Algorithms, 1994
- Internet Privacy Enhanced MailCommunications of the ACM, 1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- Maximal Flow Through a NetworkCanadian Journal of Mathematics, 1956