default search action
6th USENIX Security Symposium 1996: San Jose, CA, USA
- Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996. USENIX Association 1996
- Lei Tang:
A Framework for Building an Electronic Currency System. - Steven H. Low:
Chrg-http: A Tool for Micropayments on the World Wide Web. - Trent Jaeger, Atul Prakash:
Building Systems That Flexibly Download Executable Content. - James M. Galvin:
Public Key Distribution with Secure DNS. - Don Davis:
Compliance Defects in Public Key Cryptography. - David Safford, Douglas Lee Schales, David K. Hess:
Texas A&M University Anarchistic Key Authorization (AKA). - Wietse Z. Venema:
Murphy's Law and Computer Security. - Dan Zerkle, Karl N. Levitt:
NetKuang - A Multi-Host Configuration Vulnerability Checker. - Steven M. Bellovin:
Problem Areas for the IP Security Protocols. - Ian Goldberg, David A. Wagner, Randi Thomas, Eric A. Brewer:
A Secure Environment for Untrusted Helper Applications. - Kenneth M. Walker, Daniel F. Sterne, Lee Badger, Michael J. Petkac, David L. Sherman, Karen A. Oostendorp:
Confining Root Programs with Domain and Type Enforcement. - Barry Jaspan:
Dual-workfactor Encrypted Key Exchange: Efficiently Preventing Password Chaining and Dictionary Attacks. - Dan Boneh, Richard J. Lipton:
A Revocable Backup System.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.