Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
RFC1321: The MD5 Message-Digest Algorithm1992 RFC
Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. ACM
    Weerasena H and Mishra P (2024). Security of Electrical, Optical, and Wireless On-chip Interconnects: A Survey, ACM Transactions on Design Automation of Electronic Systems, 29:2, (1-41), Online publication date: 31-Mar-2024.
  2. Jordan M, Lignati B, Korol G, Rutzig M and Beck A (2023). MVSym, Integration, the VLSI Journal, 93:C, Online publication date: 1-Nov-2023.
  3. Xia J, Cheng G, Luo L, Guo D, Lv P and Sun B (2023). The Doctrine of MEAN: Realizing Deduplication Storage at Unreliable Edge, IEEE Transactions on Parallel and Distributed Systems, 34:10, (2811-2826), Online publication date: 1-Oct-2023.
  4. Liu R, Zhang X, Xie Z, Wang X, Li Z, Chen X, Han Y and Tang M (2023). FeCrypto: Instruction Set Architecture for Cryptographic Algorithms Based on FeFET-Based In-Memory Computing, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 42:9, (2889-2902), Online publication date: 1-Sep-2023.
  5. ACM
    Tan N, Luettgau J, Marquez J, Teranishi K, Morales N, Bhowmick S, Cappello F, Taufer M and Nicolae B Scalable Incremental Checkpointing using GPU-Accelerated De-Duplication Proceedings of the 52nd International Conference on Parallel Processing, (665-674)
  6. ACM
    Wang K, Zou Z, Zhao M, Deng Q, Shang Y, Liang Y, Wu R, Shen X, Lyu T and Fan C RL4RS: A Real-World Dataset for Reinforcement Learning based Recommender System Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, (2935-2944)
  7. Ryabinin K and Chuprina S Semantic Hashing to Remedy Uncertainties in Ontology-Driven Edge Computing Computational Science – ICCS 2023, (656-671)
  8. ACM
    Nigatu H, Pickoff-White L, Canny J and Chasins S Co-Designing for Transparency: Lessons from Building a Document Organization Tool in the Criminal Justice Domain Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, (1463-1478)
  9. Lin Y, Huang Z and Li Y (2023). Learning hash index based on a shallow autoencoder, Applied Intelligence, 53:12, (14999-15010), Online publication date: 1-Jun-2023.
  10. Jeon S, Shin C, Ko E and Moon J (2022). A security scheme for distributing analysis codes supporting CDM-based research in a multi-center environment, Computer Methods and Programs in Biomedicine, 226:C, Online publication date: 1-Nov-2022.
  11. ACM
    Schmidbauer T, Keller J and Wendzel S Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication Proceedings of the 17th International Conference on Availability, Reliability and Security, (1-10)
  12. ACM
    Mansouri Ghiasi N, Park J, Mustafa H, Kim J, Olgun A, Gollwitzer A, Senol Cali D, Firtina C, Mao H, Almadhoun Alserr N, Ausavarungnirun R, Vijaykumar N, Alser M and Mutlu O GenStore: a high-performance in-storage processing system for genome sequence analysis Proceedings of the 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, (635-654)
  13. Agrawal D, Minocha S, Namasudra S and Gandomi A (2022). A robust drug recall supply chain management system using hyperledger blockchain ecosystem, Computers in Biology and Medicine, 140:C, Online publication date: 1-Jan-2022.
  14. ACM
    Schmidbauer T and Wendzel S Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels Proceedings of the 16th International Conference on Availability, Reliability and Security, (1-10)
  15. ACM
    Zhu Z, Mun J, Raman A and Athanassoulis M Reducing Bloom Filter CPU Overhead in LSM-Trees on Modern Storage Devices Proceedings of the 17th International Workshop on Data Management on New Hardware, (1-10)
  16. Olgun A, Patel M, Yağlikçi A, Luo H, Kim J, Bostanci F, Vijaykumar N, Ergin O and Mutlu O QUAC-TRNG Proceedings of the 48th Annual International Symposium on Computer Architecture, (944-957)
  17. ACM
    Charles S and Mishra P (2020). Reconfigurable Network-on-Chip Security Architecture, ACM Transactions on Design Automation of Electronic Systems, 25:6, (1-25), Online publication date: 12-Oct-2020.
  18. Leurent G and Peyrin T SHA-1 is a shambles Proceedings of the 29th USENIX Conference on Security Symposium, (1839-1856)
  19. Silva B, Rodrigues J, Canelo F, Lopes I and Lloret J (2019). Towards a cooperative security system for mobile-health applications, Electronic Commerce Research, 19:3, (629-654), Online publication date: 1-Sep-2019.
  20. Yang Q, Jin R and Zhao M Smartdedup Proceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference, (633-646)
  21. Li Y and Ge G (2019). Cryptographic and parallel hash function based on cross coupled map lattices suitable for multimedia communication security, Multimedia Tools and Applications, 78:13, (17973-17994), Online publication date: 1-Jul-2019.
  22. ACM
    Abo-Taleb A, Nabil M, Shalaby M and Elramly S An Enhanced SHA3-based Hashing Method Proceedings of the 8th International Conference on Software and Information Engineering, (145-150)
  23. Hirano M, Tsuzuki N, Ikeda S and Kobayashi R (2018). LogDrive, Journal of Cloud Computing: Advances, Systems and Applications, 7:1, (1-25), Online publication date: 1-Dec-2018.
  24. Hsieh W and Leu J (2018). Implementing a secure VoIP communication over SIP-based networks, Wireless Networks, 24:8, (2915-2926), Online publication date: 1-Nov-2018.
  25. ACM
    Mendes M and Moreno M DoHyPE Proceedings of the 24th Brazilian Symposium on Multimedia and the Web, (403-410)
  26. Moeinaddini E and Afsari F (2018). Robust watermarking in DWT domain using SVD and opposition and dimensional based modified firefly algorithm, Multimedia Tools and Applications, 77:19, (26083-26105), Online publication date: 1-Oct-2018.
  27. ACM
    Libed J, Sison A and Medina R Improved MD5 through the extension of 1024 Message Input Block Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, (18-23)
  28. ACM
    de Guzman L, Sison A and Medina R MD5 Secured Cryptographic Hash Value Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence, (54-59)
  29. Bernholdt D, Elwasif W, Kartsaklis C, Lee S and Mintz T (2018). Programmer-guided reliability for extreme-scale applications, International Journal of High Performance Computing Applications, 32:5, (598-612), Online publication date: 1-Sep-2018.
  30. Bamal R and Kasana S (2018). Slantlet based hybrid watermarking technique for medical images, Multimedia Tools and Applications, 77:10, (12493-12518), Online publication date: 1-May-2018.
  31. Xiao H, Li Z, Zhai E, Xu T, Li Y, Liu Y, Zhang Q and Liu Y Towards web-based delta synchronization for cloud storage services Proceedings of the 16th USENIX Conference on File and Storage Technologies, (155-168)
  32. Cheng H, Liu J, Mao J, Wang M, Chen J, Bian J and Hu C (2018). A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN, Security and Communication Networks, 2018, Online publication date: 1-Jan-2018.
  33. Ni L, Da X, Hu H, Liang Y, Xu R and Vazquez-Vilar G (2018). PHY-Aided Secure Communication via Weighted Fractional Fourier Transform, Wireless Communications & Mobile Computing, 2018, Online publication date: 1-Jan-2018.
  34. Wang C, Wang X, Chen X and Zhang C (2017). Robust zero-watermarking algorithm based on polar complex exponential transform and logistic mapping, Multimedia Tools and Applications, 76:24, (26355-26376), Online publication date: 1-Dec-2017.
  35. ACM
    Bellare M, Jaeger J and Len J Better Than Advertised Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (891-906)
  36. ACM
    Zhang H, Rengasamy P, Zhao S, Nachiappan N, Sivasubramaniam A, Kandemir M, Iyer R and Das C Race-to-sleep + content caching + display caching Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, (517-531)
  37. Jager T, Kohlar F, Schäge S and Schwenk J (2017). Authenticated Confidential Channel Establishment and the Security of TLS-DHE, Journal of Cryptology, 30:4, (1276-1324), Online publication date: 1-Oct-2017.
  38. Winkelmann R, Harrington J and Jnsch K (2017). EMU-SDMS, Computer Speech and Language, 45:C, (392-410), Online publication date: 1-Sep-2017.
  39. Ahmad M, Khurana S, Singh S and Alsharari H (2017). A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps, 3D Research, 8:2, (1-15), Online publication date: 1-Jun-2017.
  40. Li Y, Li X and Liu X (2017). A fast and efficient hash function based on generalized chaotic mapping with variable parameters, Neural Computing and Applications, 28:6, (1405-1415), Online publication date: 1-Jun-2017.
  41. Su Z, Chang L, Zhang G, Jiang J and Yue F (2017). Window switching strategy based semi-fragile watermarking for MP3 tamper detection, Multimedia Tools and Applications, 76:7, (9363-9386), Online publication date: 1-Apr-2017.
  42. Su Q, Wang G, Lv G, Zhang X, Deng G and Chen B (2017). A novel blind color image watermarking based on Contourlet transform and Hessenberg decomposition, Multimedia Tools and Applications, 76:6, (8781-8801), Online publication date: 1-Mar-2017.
  43. Ferrag M, Maglaras L, Janicke H, Jiang J, Shu L and Ghorbel M (2017). Authentication Protocols for Internet of Things, Security and Communication Networks, 2017, Online publication date: 1-Jan-2017.
  44. Yang C (2017). Robust high-capacity watermarking scheme based on Euclidean norms and quick coefficient alignment, Multimedia Tools and Applications, 76:1, (1455-1477), Online publication date: 1-Jan-2017.
  45. ACM
    Ye C, Ling H, Xiong Z, Zou F, Liu C and Xu F (2016). Secure Social Multimedia Big Data Sharing Using Scalable JFE in the TSHWT Domain, ACM Transactions on Multimedia Computing, Communications, and Applications, 12:4s, (1-23), Online publication date: 18-Nov-2016.
  46. Qian Q, Wang H, Hu Y, Zhou L and Li J (2016). A dual fragile watermarking scheme for speech authentication, Multimedia Tools and Applications, 75:21, (13431-13450), Online publication date: 1-Nov-2016.
  47. ACM
    Tiwari H, K. S and G. S Preserving Confidentiality and Integrity of DICOM Images Using Cryptographic Algorithms Proceedings of the Third International Symposium on Computer Vision and the Internet, (43-47)
  48. ACM
    Modiba P, Pieterse V and Haskins B Evaluating plagiarism detection software for introductory programming assignments Proceedings of the Computer Science Education Research Conference 2016, (37-46)
  49. Stevens M, Karpman P and Peyrin T Freestart Collision for Full SHA-1 Proceedings, Part I, of the 35th Annual International Conference on Advances in Cryptology --- EUROCRYPT 2016 - Volume 9665, (459-483)
  50. Davarzani R, Mozaffari S and Yaghmaie K (2016). Perceptual image hashing using center-symmetric local binary patterns, Multimedia Tools and Applications, 75:8, (4639-4667), Online publication date: 1-Apr-2016.
  51. Moreno A and Balch T (2016). Improving financial computation speed with full and subproblem memoization, Concurrency and Computation: Practice & Experience, 28:3, (905-915), Online publication date: 10-Mar-2016.
  52. Li W, Jean-Baptise G, Riveros J, Narasimhan G, Zhang T and Zhao M CacheDedup Proceedings of the 14th Usenix Conference on File and Storage Technologies, (301-314)
  53. ACM
    Di Castro D, Lewin-Eytan L, Maarek Y, Wolff R and Zohar E Enforcing k-anonymity in Web Mail Auditing Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, (327-336)
  54. Qian C and Lam S (2016). A scalable and resilient layer-2 network with ethernet compatibility, IEEE/ACM Transactions on Networking, 24:1, (231-244), Online publication date: 1-Feb-2016.
  55. Kufel J, Wilson P, Hill S, Al-Hashimi B and Whatmough P (2015). Sequence-Aware Watermark Design for Soft IP Embedded Processors, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 24:1, (276-289), Online publication date: 1-Jan-2016.
  56. Kayuni M, Khan M, Li W, Mitchell C and Yau P Generating Unlinkable IPv6 Addresses Proceedings of the Second International Conference on Security Standardisation Research - Volume 9497, (185-199)
  57. Agosta G, Barenghi A, Di Federico A and Pelosi G (2015). OpenCL performance portability for general-purpose computation on graphics processor units, Concurrency and Computation: Practice & Experience, 27:14, (3633-3660), Online publication date: 25-Sep-2015.
  58. ACM
    Eskenazi S, Gomez-Krämer P and Ogier J The Delaunay Document Layout Descriptor Proceedings of the 2015 ACM Symposium on Document Engineering, (167-175)
  59. ACM
    McDonell T, Chakravarty M, Grover V and Newton R Type-safe runtime code generation: accelerate to LLVM Proceedings of the 2015 ACM SIGPLAN Symposium on Haskell, (201-212)
  60. ACM
    Lestringant P, Guihéry F and Fouque P Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, (203-214)
  61. ACM
    Tan M, Dai S, Gupta U and Zhang Z Mapping-Aware Constrained Scheduling for LUT-Based FPGAs Proceedings of the 2015 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, (190-199)
  62. ACM
    Boudguiga A, Klaudel W and Wesolowski J On the performance of freescale i.MX6 cryptographic acceleration and assurance module Proceedings of the 2015 Workshop on Rapid Simulation and Performance Evaluation: Methods and Tools, (1-8)
  63. Granlund D, Åhlund C and Holmlund P (2015). EAP-Swift, International Journal of Distributed Sensor Networks, 2015, (49-49), Online publication date: 1-Jan-2015.
  64. Moreno A and Balch T Speeding up large-scale financial recomputation with memoization Proceedings of the 7th Workshop on High Performance Computational Finance, (17-22)
  65. Sayilar G and Chiou D Cryptoraptor Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, (154-161)
  66. Karuppiah M and Saravanan R (2014). A secure remote user mutual authentication scheme using smart cards, Journal of Information Security and Applications, 19:4, (282-294), Online publication date: 1-Nov-2014.
  67. ACM
    Chen L and Zhang Z (2014). MemGuard, ACM SIGARCH Computer Architecture News, 42:3, (49-60), Online publication date: 16-Oct-2014.
  68. ACM
    Bhatt P, de Souza J, Uto N, Capovilla J, Resende J and Suiama D Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform Proceedings of the 7th International Conference on Security of Information and Networks, (284-287)
  69. Chen L and Zhang Z MemGuard Proceeding of the 41st annual international symposium on Computer architecuture, (49-60)
  70. David Allen M, Chapman A and Blaustein B Engineering Choices for Open World Provenance Revised Selected Papers of the 5th International Provenance and Annotation Workshop on Provenance and Annotation of Data and Processes - Volume 8628, (242-253)
  71. Hao R, Li B, Ma B and Li X Improved Preimage Attacks against Reduced HAS-160 Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (524-536)
  72. ACM
    Flöck F and Acosta M WikiWho Proceedings of the 23rd international conference on World wide web, (843-854)
  73. ACM
    Cani A, Gaudesi M, Sanchez E, Squillero G and Tonda A Towards automated malware creation Proceedings of the 29th Annual ACM Symposium on Applied Computing, (157-160)
  74. Modares H, Moravejosharieh A, Lloret J and Salleh R (2014). A survey of secure protocols in Mobile IPv6, Journal of Network and Computer Applications, 39:C, (351-368), Online publication date: 1-Mar-2014.
  75. Ferreira K, Riesen R, Bridges P, Arnold D and Brightwell R (2014). Accelerating incremental checkpointing for extreme-scale computing, Future Generation Computer Systems, 30:C, (66-77), Online publication date: 1-Jan-2014.
  76. Chaves L (2014). A cost effective and preventive approach to avoid integration faults caused by mistakes in distribution of software components, Advances in Software Engineering, 2014, (7-7), Online publication date: 1-Jan-2014.
  77. Su Q, Niu Y, Wang G, Jia S and Yue J (2014). Color image blind watermarking scheme based on QR decomposition, Signal Processing, 94, (219-235), Online publication date: 1-Jan-2014.
  78. Kuppusamy K and Aghila G (2014). CaSePer, Journal of King Saud University - Computer and Information Sciences, 26:1, (19-27), Online publication date: 1-Jan-2014.
  79. Mella S and Susella R On the Homomorphic Computation of Symmetric Cryptographic Primitives Proceedings of the 14th IMA International Conference on Cryptography and Coding - Volume 8308, (28-44)
  80. ACM
    Preneel B The SHA-3 competition Proceedings of the 6th International Conference on Security of Information and Networks, (16-19)
  81. Blaner B, Abali B, Bass B, Chari S, Kalla R, Kunkel S, Lauricella K, Leavens R, Reilly J and Sandon P (2013). IBM POWER7+ processor on-chip accelerators for cryptography and active memory expansion, IBM Journal of Research and Development, 57:6, (3-3), Online publication date: 1-Nov-2013.
  82. Veltri L, Cirani S, Busanelli S and Ferrari G (2013). A novel batch-based group key management protocol applied to the Internet of Things, Ad Hoc Networks, 11:8, (2724-2737), Online publication date: 1-Nov-2013.
  83. Hajny J, Malina L, Martinasek Z and Tethal O Performance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones Revised Selected Papers of the 8th International Workshop on Data Privacy Management and Autonomous Spontaneous Security - Volume 8247, (17-33)
  84. Sasaki Y and Wang L Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 Revised Selected Papers on Selected Areas in Cryptography -- SAC 2013 - Volume 8282, (493-512)
  85. ACM
    Naskar R and Chakraborty R (2013). A generalized tamper localization approach for reversible watermarking algorithms, ACM Transactions on Multimedia Computing, Communications, and Applications, 9:3, (1-22), Online publication date: 1-Jun-2013.
  86. Khan S and Hamlen K Computation certification as a service in the cloud Proceedings of the 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, (434-441)
  87. Bouabana-Tebibel T, Tebibel N and Zemmouri S Secure scheme against data dropping Proceedings of the 16th Communications & Networking Symposium, (1-6)
  88. ACM
    Appaji Nag Yasa G and Nagesh P (2012). Space savings and design considerations in variable length deduplication, ACM SIGOPS Operating Systems Review, 46:3, (57-64), Online publication date: 18-Dec-2012.
  89. Chen F and Liu A (2012). Privacy- and integrity-preserving range queries in sensor networks, IEEE/ACM Transactions on Networking, 20:6, (1774-1787), Online publication date: 1-Dec-2012.
  90. ACM
    Calvet J, Fernandez J and Marion J Aligot Proceedings of the 2012 ACM conference on Computer and communications security, (169-182)
  91. ACM
    Merhav Y, Mesquita F, Barbosa D, Yee W and Frieder O (2012). Extracting information networks from the blogosphere, ACM Transactions on the Web, 6:3, (1-33), Online publication date: 1-Sep-2012.
  92. Chim T, Yiu S, Hui L and Li V (2012). MLAS, Ad Hoc Networks, 10:7, (1445-1456), Online publication date: 1-Sep-2012.
  93. Shen C, Nahum E, Schulzrinne H and Wright C (2012). The impact of TLS on SIP server performance, IEEE/ACM Transactions on Networking, 20:4, (1217-1230), Online publication date: 1-Aug-2012.
  94. Ihle M, Feldwisch-Drentrup H, Teixeira C, Witon A, Schelter B, Timmer J and Schulze-Bonhage A (2012). EPILEPSIAE - A European epilepsy database, Computer Methods and Programs in Biomedicine, 106:3, (127-138), Online publication date: 1-Jun-2012.
  95. Liu A, Kovacs J and Gouda M (2012). A secure cookie scheme, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:6, (1723-1730), Online publication date: 1-Apr-2012.
  96. Kanso A, Yahyaoui H and Almulla M (2012). Keyed hash function based on a chaotic map, Information Sciences: an International Journal, 186:1, (249-264), Online publication date: 1-Mar-2012.
  97. ACM
    Meyer D and Bolosky W (2012). A study of practical deduplication, ACM Transactions on Storage, 7:4, (1-20), Online publication date: 1-Jan-2012.
  98. ACM
    Srivatsa M, Liu L and Iyengar A (2011). EventGuard, ACM Transactions on Computer Systems, 29:4, (1-40), Online publication date: 1-Dec-2011.
  99. ACM
    Gamess E, Marrero P and Gámez D A delay based routing protocol with support for common services Proceedings of the 6th Latin America Networking Conference, (64-73)
  100. Karakasidis A, Verykios V and Christen P Fake injection strategies for private phonetic matching Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security, (9-24)
  101. ACM
    You L, Pollack K, Long D and Gopinath K (2011). PRESIDIO, ACM Transactions on Storage, 7:2, (1-60), Online publication date: 1-Jul-2011.
  102. Szałachowski P and Kotulski Z (2011). Secure time information in the internet key exchange protocol, Annales UMCS, Informatica, 11:3, (41-56), Online publication date: 1-Jan-2011.
  103. ACM
    Abd-Elrahman E, Boutabia M and Afifi H Video streaming security Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, (69-76)
  104. ACM
    Lee A, Minami K and Winslett M (2010). On the consistency of distributed proofs with hidden subtrees, ACM Transactions on Information and System Security, 13:3, (1-32), Online publication date: 1-Jul-2010.
  105. Zafar F, Olano M and Curtis A GPU random numbers via the tiny encryption algorithm Proceedings of the Conference on High Performance Graphics, (133-141)
  106. Wang C and Lin Y (2010). An automated system for monitoring the visual quality and authenticity of satellite video streams using a fragile watermarking approach, Digital Signal Processing, 20:3, (780-792), Online publication date: 1-May-2010.
  107. Liu A, Meiners C and Torng E (2010). TCAM Razor, IEEE/ACM Transactions on Networking, 18:2, (490-500), Online publication date: 1-Apr-2010.
  108. Chen F and Liu A SafeQ Proceedings of the 29th conference on Information communications, (2642-2650)
  109. ACM
    Hefeeda M and Mokhtarian K (2010). Authentication schemes for multimedia streams, ACM Transactions on Multimedia Computing, Communications, and Applications, 6:1, (1-24), Online publication date: 1-Feb-2010.
  110. Seberry J, Charnes C, Pieprzyk J and Safavi-Naini R Crypto topics and applications I Algorithms and theory of computation handbook, (12-12)
  111. Park J, Park C and Chung Y (2010). Energy and Latency Efficient Access of Wireless XML Stream, Journal of Database Management, 21:1, (58-79), Online publication date: 1-Jan-2010.
  112. Yang C and Shen J (2010). Recover the tampered image based on VQ indexing, Signal Processing, 90:1, (331-343), Online publication date: 1-Jan-2010.
  113. Liu A (2009). Firewall policy verification and troubleshooting, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:16, (2800-2809), Online publication date: 1-Nov-2009.
  114. ACM
    Briscoe G and De Wilde P Computing of applied digital ecosystems Proceedings of the International Conference on Management of Emergent Digital EcoSystems, (28-35)
  115. Martignon F, Paris S and Capone A (2009). Design and implementation of MobiSEC, Computer Networks: The International Journal of Computer and Telecommunications Networking, 53:12, (2192-2207), Online publication date: 1-Aug-2009.
  116. Liu A and Bailey L (2009). PAP, Computer Communications, 32:7-10, (1194-1199), Online publication date: 1-May-2009.
  117. Sasaki Y and Aoki K Finding Preimages in Full MD5 Faster Than Exhaustive Search Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (134-152)
  118. Wang X, Yu H, Wang W, Zhang H and Zhan T Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (121-133)
  119. Gauravaram P and Knudsen L On Randomizing Hash Functions to Strengthen the Security of Digital Signatures Proceedings of the 28th Annual International Conference on Advances in Cryptology - EUROCRYPT 2009 - Volume 5479, (88-105)
  120. Karroumi M and Massoudi A Hash-Based Key Management Schemes for MPEG4-FGS Proceedings of the 5th International Conference on Information Security Practice and Experience, (245-256)
  121. ACM
    Allman M (2009). Comments on selecting ephemeral ports, ACM SIGCOMM Computer Communication Review, 39:2, (13-19), Online publication date: 31-Mar-2009.
  122. Cheng W and Tan K (2009). Query assurance verification for outsourced multi-dimensional databases, Journal of Computer Security, 17:1, (101-126), Online publication date: 1-Jan-2009.
  123. Collberg C, Huntwork A, Carter E, Townsend G and Stepp M (2009). More on graph theoretic software watermarks, Information and Software Technology, 51:1, (56-67), Online publication date: 1-Jan-2009.
  124. ACM
    Ftima F, Karoui K and Ghzela H A secure mobile agents approach for anomalies detection on firewalls Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services, (689-693)
  125. ACM
    Kiess W, Chmill N, Wittelsbürger U and Mauve M Modular network trace analysis Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (1-6)
  126. ACM
    Wang X, Zhang R, Yang X, Jiang X and Wijesekera D Voice pharming attack and the trust of VoIP Proceedings of the 4th international conference on Security and privacy in communication netowrks, (1-11)
  127. ACM
    Rönnau S, Pauli C and Borghoff U Merging changes in XML documents using reliable context fingerprints Proceedings of the eighth ACM symposium on Document engineering, (52-61)
  128. ACM
    Siersdorfer S and Sizov S (2008). Meta methods for model sharing in personal information systems, ACM Transactions on Information Systems, 26:4, (1-35), Online publication date: 1-Sep-2008.
  129. Pang H and Mouratidis K (2008). Authenticating the query results of text search engines, Proceedings of the VLDB Endowment, 1:1, (126-137), Online publication date: 1-Aug-2008.
  130. ACM
    Seo J and Croft W Local text reuse detection Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval, (571-578)
  131. Jiang W, Clifton C and Kantarcıoğlu M (2008). Transforming semi-honest protocols to ensure accountability, Data & Knowledge Engineering, 65:1, (57-74), Online publication date: 1-Apr-2008.
  132. ACM
    Chang K and Shin K (2008). Distributed Authentication of Program Integrity Verification in Wireless Sensor Networks, ACM Transactions on Information and System Security, 11:3, (1-35), Online publication date: 15-Mar-2008.
  133. ACM
    Pang H and Tan K (2008). Verifying Completeness of Relational Query Answers from Online Servers, ACM Transactions on Information and System Security, 11:2, (1-50), Online publication date: 1-Mar-2008.
  134. ACM
    Tzeng S and Wei L Parallel white noise generation on a GPU via cryptographic hash Proceedings of the 2008 symposium on Interactive 3D graphics and games, (79-87)
  135. Chen W and Lio J A novel biometric DES cryptosystem with IRIS key generation and personal authentication from human eye Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications, (175-180)
  136. Gonzalez I, Lopez-Buedo S and Gomez-Arribas F (2008). Implementation of secure applications in self-reconfigurable systems, Microprocessors & Microsystems, 32:1, (23-32), Online publication date: 1-Feb-2008.
  137. ACM
    Lu T and Hsu L Hierarchical watermarking technique of distortion control mechanism Proceedings of the 2nd international conference on Ubiquitous information management and communication, (339-346)
  138. Sasaki Y, Wang L, Kunihiro N and Ohta K (2008). New Message Differences for Collision Attacks on MD4 and MD5, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (55-63), Online publication date: 1-Jan-2008.
  139. Naito Y, Ohta K and Kunihiro N (2008). Improved Collision Search for Hash Functions, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91-A:1, (46-54), Online publication date: 1-Jan-2008.
  140. ACM
    Vijayasankar K, Sivathanu G, Sundararaman S and Zadok E Exploiting type-awareness in a self-recovering disk Proceedings of the 2007 ACM workshop on Storage security and survivability, (25-30)
  141. ACM
    Lee H, Malkin T and Nahum E Cryptographic strength of ssl/tls servers Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (83-92)
  142. ACM
    Austin R Digital forensics on the cheap Proceedings of the 4th annual conference on Information security curriculum development, (1-5)
  143. Sohn A, Kwak H and Chung K DISH Proceedings of the Third international conference on High Performance Computing and Communications, (785-796)
  144. Basagiannis S, Katsaros P and Pombortsis A Intrusion attack tactics for the model checking of e-commerce security guarantees Proceedings of the 26th international conference on Computer Safety, Reliability, and Security, (238-251)
  145. ACM
    Potyra S, Sieh V and Cin M Evaluating fault-tolerant system designs using FAUmachine Proceedings of the 2007 workshop on Engineering fault tolerant systems, (9-es)
  146. Ashkenazi A and Akselrod D (2007). Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices, Computers and Electrical Engineering, 33:5-6, (407-424), Online publication date: 1-Sep-2007.
  147. Gouda M, Liu A, Leung L and Alam M (2007). SPP, Computer Networks: The International Journal of Computer and Telecommunications Networking, 51:13, (3715-3726), Online publication date: 1-Sep-2007.
  148. Wang C and Lin Y Watermarking algorithm with post-compression capability for digital video surveillance Proceedings of the Ninth IASTED International Conference on Signal and Image Processing, (13-18)
  149. Pasini S and Vaudenay S Hash-and-sign with weak hashing made secure Proceedings of the 12th Australasian conference on Information security and privacy, (338-354)
  150. ACM
    Kittur A, Suh B, Pendleton B and Chi E He says, she says Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (453-462)
  151. Memon Q, Akhtar S and Aly A Role management in adhoc networks Proceedings of the 2007 spring simulaiton multiconference - Volume 1, (131-137)
  152. Scharinger J A systems theoretic approach to the design of scalable cryptographic hash functions Proceedings of the 11th international conference on Computer aided systems theory, (10-17)
  153. Glabb R, Imbert L, Jullien G, Tisserand A and Veyrat-Charvillon N (2007). Multi-mode operator for SHA-2 hash functions, Journal of Systems Architecture: the EUROMICRO Journal, 53:2-3, (127-138), Online publication date: 1-Feb-2007.
  154. Lee S and Choi Y (2006). A secure alternate path routing in sensor networks, Computer Communications, 30:1, (153-165), Online publication date: 1-Dec-2006.
  155. Jun S and Astley M Low-overhead message tracking for distributed messaging Proceedings of the ACM/IFIP/USENIX 2006 International Conference on Middleware, (363-381)
  156. Bernstein Y and Zobel J (2006). Accurate discovery of co-derivative documents via duplicate text detection, Information Systems, 31:7, (595-609), Online publication date: 1-Nov-2006.
  157. ACM
    Corradini F, Ercoli C, Lazzari A and Polzonetti A A secure framework in mobile business transactions Proceedings of the 3rd international conference on Mobile technology, applications & systems, (35-es)
  158. ACM
    Shin S, Jung J and Balakrishnan H Malware prevalence in the KaZaA file-sharing network Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, (333-338)
  159. ACM
    Stamey J and Saunders B Documenting aspect-oriented PHP (AOPHP) Proceedings of the 24th annual ACM international conference on Design of communication, (210-213)
  160. ACM
    Agosta G, Reghizzi S and Svelto G Jelatine Proceedings of the 4th international workshop on Java technologies for real-time and embedded systems, (170-177)
  161. Pietzowski A, Satzger B, Trumler W and Ungerer T A bio-inspired approach for self-protecting an organic middleware with artificial antibodies Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems, (202-215)
  162. Ren K, Lou W, Zeng K, Bao F, Zhou J and Deng R (2006). Routing optimization security in mobile IPv6, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:13, (2401-2419), Online publication date: 15-Sep-2006.
  163. ACM
    Vazhkudai S, Ma X, Freeh V, Strickland J, Tammineedi N, Simon T and Scott S (2006). Constructing collaborative desktop storage caches for large scientific datasets, ACM Transactions on Storage, 2:3, (221-254), Online publication date: 1-Aug-2006.
  164. Cheng W, Pang H and Tan K Authenticating Multi-dimensional Query Results in Data Publishing 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security on Data and Applications Security XX - Volume 4127, (60-73)
  165. ACM
    Bassil C, Serhrouchni A and Rouhana N Simple voice security protocol Proceedings of the 2006 international conference on Wireless communications and mobile computing, (367-372)
  166. ACM
    Li K and Zhong Z Fast statistical spam filter by approximate classifications Proceedings of the joint international conference on Measurement and modeling of computer systems, (347-358)
  167. ACM
    Li K and Zhong Z (2006). Fast statistical spam filter by approximate classifications, ACM SIGMETRICS Performance Evaluation Review, 34:1, (347-358), Online publication date: 26-Jun-2006.
  168. ACM
    Bhattacharjee B, Abe N, Goldman K, Zadrozny B, Chillakuru V, del Carpio M and Apte C Using secure coprocessors for privacy preserving collaborative data mining and analysis Proceedings of the 2nd international workshop on Data management on new hardware, (1-es)
  169. Liao I, Lee C and Hwang M (2006). A password authentication scheme over insecure networks, Journal of Computer and System Sciences, 72:4, (727-740), Online publication date: 1-Jun-2006.
  170. ACM
    Zhao Y, Hou X, Yang M and Dai Y Measurement study and application of social network in the Maze P2P file-sharing system Proceedings of the 1st international conference on Scalable information systems, (57-es)
  171. Tianzhou C, Yu H, Feng C and Wei H A new security architecture for mobile communication Proceedings of the 17th IASTED international conference on Modelling and simulation, (424-429)
  172. ACM
    Sy D and Bao L CAPTRA Proceedings of the 5th international conference on Information processing in sensor networks, (152-159)
  173. Liu X, Lan J, Shenoy P and Ramaritham K (2006). Consistency maintenance in dynamic peer-to-peer overlay networks, Computer Networks: The International Journal of Computer and Telecommunications Networking, 50:6, (859-876), Online publication date: 13-Apr-2006.
  174. ACM
    Yue Y, Lin C and Tan Z (2005). NPCryptBench, ACM SIGARCH Computer Architecture News, 34:1, (49-56), Online publication date: 1-Mar-2006.
  175. ACM
    Pramstaller N, Rechberger C and Rijmen V A compact FPGA implementation of the hash function whirlpool Proceedings of the 2006 ACM/SIGDA 14th international symposium on Field programmable gate arrays, (159-166)
  176. Dini G and Savino I Scalable and secure group rekeying in wireless sensor networks Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks, (84-88)
  177. Pasini S and Vaudenay S An optimal non-interactive message authentication protocol Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology, (280-294)
  178. Vaudenay S On bluetooth repairing Proceedings of the First SKLOIS conference on Information Security and Cryptology, (1-9)
  179. Abd-El-Malek M, Courtright W, Cranor C, Ganger G, Hendricks J, Klosterman A, Mesnier M, Prasad M, Salmon B, Sambasivan R, Sinnamohideen S, Strunk J, Thereska E, Wachs M and Wylie J Ursa minor Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4, (5-5)
  180. Bakiras S, Loukopoulos T, Papadias D and Ahmad I (2005). Adaptive schemes for distributed web caching, Journal of Parallel and Distributed Computing, 65:12, (1483-1496), Online publication date: 1-Dec-2005.
  181. Yoo K, Kim M and Lee W Invertible watermarking scheme for authentication and integrity Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II, (371-381)
  182. ACM
    Sivathanu G, Wright C and Zadok E Ensuring data integrity in storage Proceedings of the 2005 ACM workshop on Storage security and survivability, (26-36)
  183. Alexandridis G, Voyiatzis A and Serpanos D CryptoPalm Proceedings of the 10th Panhellenic conference on Advances in Informatics, (651-660)
  184. ACM
    Pan K, Whitehead E and Ge G Textual and behavioral views of function changes Proceedings of the 3rd international workshop on Traceability in emerging forms of software engineering, (8-13)
  185. ACM
    Srivatsa M and Liu L Securing publish-subscribe overlay services with EventGuard Proceedings of the 12th ACM conference on Computer and communications security, (289-298)
  186. ACM
    Bernstein Y and Zobel J Redundant documents and search effectiveness Proceedings of the 14th ACM international conference on Information and knowledge management, (736-743)
  187. ACM
    Abd-El-Malek M, Ganger G, Goodson G, Reiter M and Wylie J Fault-scalable Byzantine fault-tolerant services Proceedings of the twentieth ACM symposium on Operating systems principles, (59-74)
  188. ACM
    Abd-El-Malek M, Ganger G, Goodson G, Reiter M and Wylie J (2005). Fault-scalable Byzantine fault-tolerant services, ACM SIGOPS Operating Systems Review, 39:5, (59-74), Online publication date: 20-Oct-2005.
  189. ACM
    Gupta V (2005). Trust and accountability issues in scalable invalidation-based web cache consistency, ACM SIGOPS Operating Systems Review, 39:4, (23-36), Online publication date: 1-Oct-2005.
  190. ACM
    Al-Hamdani W and Griskell I A proposed curriculum of cryptography courses Proceedings of the 2nd annual conference on Information security curriculum development, (4-11)
  191. Yue Y, Lin C and Tan Z NPCryptBench Proceedings of the 2005 workshop on MEmory performance: DEaling with Applications , systems and architecture, (49-56)
  192. ACM
    Rafiei D Bulk loading large collections of hyperlinked resources Proceedings of the sixteenth ACM conference on Hypertext and hypermedia, (267-269)
  193. Chevul S, Isaksson L, Fiedler M and Lindberg P Measurement of application-perceived throughput of an e2e VPN connection using a GPRS network Proceedings of the Second international conference on Wireless Systems and Network Architectures in Next Generation Internet, (255-268)
  194. Lin I, Hwang M and Chang C (2005). The General Pay-Word, Designs, Codes and Cryptography, 36:1, (53-67), Online publication date: 1-Jul-2005.
  195. ACM
    Yang S, Butt A, Hu Y and Midkiff S Trust but verify Proceedings of the tenth ACM SIGPLAN symposium on Principles and practice of parallel programming, (196-205)
  196. ACM
    Pang H, Jain A, Ramamritham K and Tan K Verifying completeness of relational query results in data publishing Proceedings of the 2005 ACM SIGMOD international conference on Management of data, (407-418)
  197. Hu Y, Jakobsson M and Perrig A Efficient constructions for one-way hash chains Proceedings of the Third international conference on Applied Cryptography and Network Security, (423-441)
  198. Chen J, Chen T and Pan Y (2005). A crisscross checking technique for tamper detection in halftone images, Journal of Systems and Software, 76:3, (287-295), Online publication date: 1-Jun-2005.
  199. ACM
    Du W, Wang R and Ning P An efficient scheme for authenticating public keys in sensor networks Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (58-67)
  200. ACM
    Platte J and Naroska E A combined hardware and software architecture for secure computing Proceedings of the 2nd conference on Computing frontiers, (280-288)
  201. Abdel-Hamid A, Tahar S and Aboulhamid E A Public-Key Watermarking Technique for IP Designs Proceedings of the conference on Design, Automation and Test in Europe - Volume 1, (330-335)
  202. ACM
    McGregor J and Lee R (2005). Protecting cryptographic keys and computations via virtual secure coprocessing, ACM SIGARCH Computer Architecture News, 33:1, (16-26), Online publication date: 1-Mar-2005.
  203. Wang H, Cao J and Zhang Y (2005). A Flexible Payment Scheme and Its Role-Based Access Control, IEEE Transactions on Knowledge and Data Engineering, 17:3, (425-436), Online publication date: 1-Mar-2005.
  204. Nandi M, Lee W, Sakurai K and Lee S Security analysis of a 2/3-rate double length compression function in the black-box model Proceedings of the 12th international conference on Fast Software Encryption, (243-254)
  205. ACM
    Hansen S, Skriver J and Nielson H Using static analysis to validate the SAML single sign-on protocol Proceedings of the 2005 workshop on Issues in the theory of security, (27-40)
  206. Wang H, Sun L, Zhang Y and Cao J Authorization algorithms for the mobility of user-role relationship Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38, (69-77)
  207. ACM
    Ku W, Chiang M and Chang S (2005). Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme, ACM SIGOPS Operating Systems Review, 39:1, (85-89), Online publication date: 1-Jan-2005.
  208. ACM
    Huang D and Medhi D (2004). A key-chain-based keying scheme for many-to-many secure group communication, ACM Transactions on Information and System Security, 7:4, (523-552), Online publication date: 11-Nov-2004.
  209. ACM
    Raffo D, Adjih C, Clausen T and Mühlethaler P An advanced signature system for OLSR Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, (10-16)
  210. ACM
    Chang C and Lin I (2004). An improvement of delegated multisignature scheme with document decomposition, ACM SIGOPS Operating Systems Review, 38:4, (52-57), Online publication date: 1-Oct-2004.
  211. ACM
    Lazos L and Poovendran R SeRLoc Proceedings of the 3rd ACM workshop on Wireless security, (21-30)
  212. Tan Z, Lin C, Yin H and Li B (2004). Optimization and Benchmark of Cryptographic Algorithms on Network Processors, IEEE Micro, 24:5, (55-69), Online publication date: 1-Sep-2004.
  213. Abdel-Hamid A, Tahar S and Aboulhamid E (2004). A Survey on IP Watermarking Techniques, Design Automation for Embedded Systems, 9:3, (211-227), Online publication date: 1-Sep-2004.
  214. ACM
    Hu Y, Perrig A and Sirbu M (2004). SPV, ACM SIGCOMM Computer Communication Review, 34:4, (179-192), Online publication date: 30-Aug-2004.
  215. ACM
    Hu Y, Perrig A and Sirbu M SPV Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (179-192)
  216. Petroni N, Fraser T, Molina J and Arbaugh W Copilot - a coprocessor-based kernel runtime integrity monitor Proceedings of the 13th conference on USENIX Security Symposium - Volume 13, (13-13)
  217. ACM
    Chang T, Velayutham A and Sivakumar R Mimic Proceedings of the 2nd international conference on Mobile systems, applications, and services, (165-176)
  218. Prodanoff Z and Christensen K (2004). Managing routing tables for URL routers in content distribution networks, International Journal of Network Management, 14:3, (177-192), Online publication date: 1-May-2004.
  219. ACM
    Park Y and Lee G Repairing return address stack for buffer overflow protection Proceedings of the 1st conference on Computing frontiers, (335-342)
  220. Aranya A, Wright C and Zadok E Tracefs Proceedings of the 3rd USENIX conference on File and storage technologies, (10-10)
  221. Aranya A, Wright C and Zadok E Tracefs: A File System to Trace Them All Proceedings of the 3rd USENIX Conference on File and Storage Technologies, (129-145)
  222. Pang H and Tan K Authenticating Query Results in Edge Computing Proceedings of the 20th International Conference on Data Engineering
  223. Mogul J, Chan Y and Kelly T Design, implementation, and evaluation of duplicate transfer detection in HTTP Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, (4-4)
  224. Juang W (2004). Efficient password authenticated key agreement using smart cards, Computers and Security, 23:2, (167-173), Online publication date: 1-Mar-2004.
  225. Wang M, Su C, Huang C and Wu C An HMAC processor with integrated SHA-1 and MD5 algorithms Proceedings of the 2004 Asia and South Pacific Design Automation Conference, (456-458)
  226. References Grid resource management, (507-566)
  227. Matalgah M, Qaddour J, Elkeelany O and Sheikh K Portability architecture for nomadic wireless internet access users and security performance evaluation Wireless communications systems and networks, (319-357)
  228. ACM
    Peng C, Deng R, Wu Y and Shao W A flexible and scalable authentication scheme for JPEG2000 image codestreams Proceedings of the eleventh ACM international conference on Multimedia, (433-441)
  229. Hühnlein D, Jacobson M and Weber D (2003). Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders, Designs, Codes and Cryptography, 30:3, (281-299), Online publication date: 1-Nov-2003.
  230. ACM
    Oliva D, Buchty R and Heintze N AES and the cryptonite crypto processor Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems, (198-209)
  231. ACM
    Venugopalan R, Ganesan P, Peddabachagari P, Dean A, Mueller F and Sichitiu M Encryption overhead in embedded systems and sensor network nodes Proceedings of the 2003 international conference on Compilers, architecture and synthesis for embedded systems, (188-197)
  232. ACM
    Aiello W, Ioannidis J and McDaniel P Origin authentication in interdomain routing Proceedings of the 10th ACM conference on Computer and communications security, (165-178)
  233. Bicakci K, Tsudik G and Tung B (2003). How to construct optimal one-time signatures, Computer Networks: The International Journal of Computer and Telecommunications Networking, 43:3, (339-349), Online publication date: 22-Oct-2003.
  234. ACM
    Ku W, Chen C and Lee H (2003). Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme, ACM SIGOPS Operating Systems Review, 37:4, (19-25), Online publication date: 1-Oct-2003.
  235. Deguillaume F, Voloshynovskiy S and Pun T (2003). Secure hybrid robust watermarking resistant against tampering and copy attack, Signal Processing, 83:10, (2133-2170), Online publication date: 1-Oct-2003.
  236. ACM
    Ganesan P, Venugopalan R, Peddabachagari P, Dean A, Mueller F and Sichitiu M Analyzing and modeling encryption overhead for sensor network nodes Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications, (151-159)
  237. Percival C An automated binary security update system for FreeBSD Proceedings of the BSD Conference 2003 on BSD Conference, (4-4)
  238. ACM
    Rafaeli S and Hutchison D (2003). A survey of key management for secure group communication, ACM Computing Surveys, 35:3, (309-329), Online publication date: 1-Sep-2003.
  239. Liu X, Maly K, Zubair M and Nelson M Repository synchronization in the OAI framework Proceedings of the 3rd ACM/IEEE-CS joint conference on Digital libraries, (191-198)
  240. ACM
    Bawa M, Bayardo R, Rajagopalan S and Shekita E Make it fresh, make it quick Proceedings of the 12th international conference on World Wide Web, (577-586)
  241. Sherman A and McGrew D (2003). Key Establishment in Large Dynamic Groups Using One-Way Function Trees, IEEE Transactions on Software Engineering, 29:5, (444-458), Online publication date: 1-May-2003.
  242. Sangpachatanaruk C, Khattab S, Znati T, Melhem R and Mossé D A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks Proceedings of the 36th annual symposium on Simulation
  243. ACM
    Atallah M and Lonardi S Authentication of LZ-77 compressed data Proceedings of the 2003 ACM symposium on Applied computing, (282-287)
  244. Wang H, Cao J and Zhang Y A flexible payment scheme and its permission-role assignment Proceedings of the 26th Australasian computer science conference - Volume 16, (189-198)
  245. Hiltunen M, Schlichting R and Ugarte C (2003). Building Survivable Services Using Redundancy and Adaptation, IEEE Transactions on Computers, 52:2, (181-194), Online publication date: 1-Feb-2003.
  246. Li H and Wang Y Public-key infrastructure Payment technologies for E-commerce, (39-70)
  247. Hamey L Teaching secure communication protocols using a game representation Proceedings of the fifth Australasian conference on Computing education - Volume 20, (187-196)
  248. Wang H, Zhang Y and Cao J Formal authorisation allocation approaches for permission-role assignments using relational algebra operations Proceedings of the 14th Australasian database conference - Volume 17, (125-133)
  249. Pointcheval D and Poupard G (2003). A New \mathcal{NP} -Complete Problem and Public-Key Identification, Designs, Codes and Cryptography, 28:1, (5-31), Online publication date: 1-Jan-2003.
  250. Snoeren A, Partridge C, Sanchez L, Jones C, Tchakountio F, Schwartz B, Kent S and Strayer W (2002). Single-packet IP traceback, IEEE/ACM Transactions on Networking, 10:6, (721-734), Online publication date: 1-Dec-2002.
  251. Lee Y, Leung K and Satyanarayanan M (2002). Operation Shipping for Mobile File Systems, IEEE Transactions on Computers, 51:12, (1410-1422), Online publication date: 1-Dec-2002.
  252. ACM
    Deng R, Zhou J and Bao F Defending against redirect attacks in mobile IP Proceedings of the 9th ACM conference on Computer and communications security, (59-67)
  253. Liu L, Tang W, Buttler D and Pu C (2002). Information Monitoring on the Web, World Wide Web, 5:4, (263-304), Online publication date: 12-Nov-2002.
  254. ACM
    Di Pietro R, Mancini L and Jajodia S Efficient and secure keys management for wireless mobile communications Proceedings of the second ACM international workshop on Principles of mobile computing, (66-73)
  255. ACM
    Spring N, Mahajan R and Wetherall D (2002). Measuring ISP topologies with rocketfuel, ACM SIGCOMM Computer Communication Review, 32:4, (133-145), Online publication date: 1-Oct-2002.
  256. ACM
    Faria D and Cheriton D DoS and authentication in wireless public access networks Proceedings of the 1st ACM workshop on Wireless security, (47-56)
  257. ACM
    Bhattacharyya M, Hershkop S and Eskin E MET Proceedings of the 2002 workshop on New security paradigms, (3-10)
  258. Vervoort M and Plasmeijer R Lazy dynamic input/output in the lazy functional language clean Proceedings of the 14th international conference on Implementation of functional languages, (101-117)
  259. ACM
    Spring N, Mahajan R and Wetherall D Measuring ISP topologies with rocketfuel Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications, (133-145)
  260. ACM
    Scott D and Sharp R Abstracting application-level web security Proceedings of the 11th international conference on World Wide Web, (396-407)
  261. ACM
    Abu-Ghazaleh N and Phatak D Verification caching Proceedings of the 2002 ACM symposium on Applied computing, (964-968)
  262. ACM
    Burnside M, Clarke D, Mills T, Maywah A, Devadas S and Rivest R Proxy-based security protocols in networked mobile devices Proceedings of the 2002 ACM symposium on Applied computing, (265-272)
  263. Bahn H, Lee H, Noh S, Lyul Min S and Koh K (2002). Replica-aware caching for Web proxies, Computer Communications, 25:3, (183-188), Online publication date: 1-Feb-2002.
  264. Ohzahata S, Kimura S and Ebihara Y A Fast Authentication Method for Secure and Seamless Handoff Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II, (243-252)
  265. Finkel R, Zaslavsky A, Monostori K and Schmidt H (2002). Signature extraction for overlap detection in documents, Australian Computer Science Communications, 24:1, (59-64), Online publication date: 1-Jan-2002.
  266. Finkel R, Zaslavsky A, Monostori K and Schmidt H Signature extraction for overlap detection in documents Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4, (59-64)
  267. Douligeris C and Vasilakos T Mobile IP protocols Handbook of wireless networks and mobile computing, (529-552)
  268. Liang Z, Hassanein H and Martin P Transparent Distributed Web Caching Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
  269. ACM
    Perrig A The BiBa one-time signature and broadcast authentication protocol Proceedings of the 8th ACM conference on Computer and Communications Security, (28-37)
  270. Memik G, Mangione-Smith W and Hu W NetBench Proceedings of the 2001 IEEE/ACM international conference on Computer-aided design, (39-42)
  271. ACM
    Xu J, Fan J, Ammar M and Moon S On the design and performance of prefix-preserving IP traffic trace anonymization Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (263-266)
  272. ACM
    Peuhkuri M A method to compress and anonymize packet traces Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (257-261)
  273. ACM
    Jung J, Sit E, Balakrishnan H and Morris R DNS performance and the effectiveness of caching Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (153-167)
  274. ACM
    Snoeren A, Partridge C, Sanchez L, Jones C, Tchakountio F, Kent S and Strayer W (2001). Hash-based IP traceback, ACM SIGCOMM Computer Communication Review, 31:4, (3-14), Online publication date: 1-Oct-2001.
  275. ACM
    Snoeren A, Partridge C, Sanchez L, Jones C, Tchakountio F, Kent S and Strayer W Hash-based IP traceback Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (3-14)
  276. ACM
    (2001). The architecture and performance of security protocols in the ensemble group communication system, ACM Transactions on Information and System Security, 4:3, (289-319), Online publication date: 1-Aug-2001.
  277. ACM
    Perrig A, Szewczyk R, Wen V, Culler D and Tygar J SPINS Proceedings of the 7th annual international conference on Mobile computing and networking, (189-199)
  278. ACM
    Qu G Publicly detectable techniques for the protection virtual components Proceedings of the 38th annual Design Automation Conference, (474-479)
  279. ACM
    Park J, Sandhu R and Ahn G (2001). Role-based access control on the web, ACM Transactions on Information and System Security, 4:1, (37-71), Online publication date: 1-Feb-2001.
  280. Loureiro S, Molva R and Pannetrat A (2001). Secure Data Collection with Updates, Electronic Commerce Research, 1:1-2, (119-130), Online publication date: 1-Feb-2001.
  281. Wang H and Zhang Y Untraceable off-line electronic cash flow in e-commerce Proceedings of the 24th Australasian conference on Computer science, (191-198)
  282. Wang H and Zhang Y (2001). Untraceable off-line electronic cash flow in e-commerce, Australian Computer Science Communications, 23:1, (191-198), Online publication date: 1-Jan-2001.
  283. Novikov A and Hamilton M FTP Mirror Tracker: A Few Steps Towards URN Proceedings of the 14th USENIX conference on System administration, (181-186)
  284. ACM
    Ghosh D (2000). Mobile IP, XRDS: Crossroads, The ACM Magazine for Students, 7:2, (10-17), Online publication date: 1-Dec-2000.
  285. Castro M and Liskov B Proactive recovery in a Byzantine-fault-tolerant system Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
  286. Anderson D, Chase J and Vahdat A Interposed request routing for scalable network storage Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
  287. ACM
    Satyanarayanan M (2000). Caching trust rather than content, ACM SIGOPS Operating Systems Review, 34:4, (32-33), Online publication date: 1-Oct-2000.
  288. ACM
    Spring N and Wetherall D (2000). A protocol-independent technique for eliminating redundant network traffic, ACM SIGCOMM Computer Communication Review, 30:4, (87-95), Online publication date: 1-Oct-2000.
  289. ACM
    Satyanarayanan M Caching trust rather than content Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system, (245-246)
  290. ACM
    Spring N and Wetherall D A protocol-independent technique for eliminating redundant network traffic Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, (87-95)
  291. Waldman M, Rubin A and Cranor L Publius Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (5-5)
  292. Provos N Encrypting virtual memory Proceedings of the 9th conference on USENIX Security Symposium - Volume 9, (3-3)
  293. ACM
    Xu Z, Miller B and Reps T Safety checking of machine code Proceedings of the ACM SIGPLAN 2000 conference on Programming language design and implementation, (70-82)
  294. Park J and Sandhu R (2000). Secure Cookies on the Web, IEEE Internet Computing, 4:4, (36-44), Online publication date: 1-Jul-2000.
  295. ACM
    Xu Z, Miller B and Reps T (2000). Safety checking of machine code, ACM SIGPLAN Notices, 35:5, (70-82), Online publication date: 1-May-2000.
  296. Petrank E and Rackoff C (2000). CBC MAC for Real-Time Data Sources, Journal of Cryptology, 13:3, (315-338), Online publication date: 1-Jan-2000.
  297. Pointcheval D and Stern J (2000). Security Arguments for Digital Signatures and Blind Signatures, Journal of Cryptology, 13:3, (361-396), Online publication date: 1-Jan-2000.
  298. ACM
    Sirer E, Grimm R, Gregory A and Bershad B (1999). Design and implementation of a distributed virtual machine for networked computers, ACM SIGOPS Operating Systems Review, 33:5, (202-216), Online publication date: 12-Dec-1999.
  299. ACM
    Wetherall D (1999). Active network vision and reality, ACM SIGOPS Operating Systems Review, 33:5, (64-79), Online publication date: 12-Dec-1999.
  300. ACM
    Sirer E, Grimm R, Gregory A and Bershad B Design and implementation of a distributed virtual machine for networked computers Proceedings of the seventeenth ACM symposium on Operating systems principles, (202-216)
  301. ACM
    Wetherall D Active network vision and reality Proceedings of the seventeenth ACM symposium on Operating systems principles, (64-79)
  302. Bargen J and Taplin S Cro-Magnon: A Patch Hunter-Gatherer Proceedings of the 13th USENIX conference on System administration, (87-94)
  303. ACM
    Aycock J and Levy M (1999). An architecture for easy Web page updating, XRDS: Crossroads, The ACM Magazine for Students, 6:2, (15-18), Online publication date: 1-Nov-1999.
  304. ACM
    Aiello W, Rubin A and Strauss M Using smartcards to secure a personalized gambling device Proceedings of the 6th ACM conference on Computer and communications security, (128-137)
  305. Kim J, Simon D and Tetali P Limits on the Efficiency of One-Way Permutation-Based Hash Functions Proceedings of the 40th Annual Symposium on Foundations of Computer Science
  306. McDaniel P, Prakash A and Honeyman P Antigone Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, (9-9)
  307. de Raadt T, Hallqvist N, Grabowski A, Keromytis A and Provos N Cryptography in OpenBSD Proceedings of the annual conference on USENIX Annual Technical Conference, (33-33)
  308. Rogaway P (1999). Bucket Hashing and Its Application to Fast Message Authentication, Journal of Cryptology, 12:2, (91-115), Online publication date: 1-Mar-1999.
  309. Castro M and Liskov B Practical Byzantine fault tolerance Proceedings of the third symposium on Operating systems design and implementation, (173-186)
  310. Oorschot P and Wiener M (1999). Parallel Collision Search with Cryptanalytic Applications, Journal of Cryptology, 12:1, (1-28), Online publication date: 1-Jan-1999.
  311. Fithen B, Kalinowski S, Carpenter J and Pickel J Infrastructure: A Prerequisite for Effective Security Proceedings of the 12th USENIX conference on System administration, (11-26)
  312. ACM
    Taylor K, Cameron M and Haines J An integrated information system on the Web for catchment management Proceedings of the 6th ACM international symposium on Advances in geographic information systems, (8-13)
  313. ACM
    Spertus E and Stein L Just-in-time databases and the World-Wide Web Proceedings of the seventh international conference on Information and knowledge management, (30-37)
  314. ACM
    Edjlali G, Acharya A and Chaudhary V History-based access control for mobile code Proceedings of the 5th ACM conference on Computer and communications security, (38-48)
  315. ACM
    Wool A Key management for encrypted broadcast Proceedings of the 5th ACM conference on Computer and communications security, (7-16)
  316. Rogaway P and Coppersmith D (1998). A Software-Optimized Encryption Algorithm, Journal of Cryptology, 11:4, (273-287), Online publication date: 1-Sep-1998.
  317. Dobbertin H (1998). Cryptanalysis of MD4, Journal of Cryptology, 11:4, (253-271), Online publication date: 1-Sep-1998.
  318. Dwork C and Naor M (1998). An Efficient Existentially Unforgeable Signature Scheme and Its Applications, Journal of Cryptology, 11:3, (187-208), Online publication date: 1-Jun-1998.
  319. ACM
    Canetti R, Micciancio D and Reingold O Perfectly one-way probabilistic hash functions (preliminary version) Proceedings of the thirtieth annual ACM symposium on Theory of computing, (131-140)
  320. ACM
    Kahng A, Lach J, Mangione-Smith W, Mantik S, Markov I, Potkonjak M, Tucker P, Wang H and Wolfe G Watermarking techniques for intellectual property protection Proceedings of the 35th annual Design Automation Conference, (776-781)
  321. ACM
    Durand D and Kahn P MAPA Proceedings of the ninth ACM conference on Hypertext and hypermedia : links, objects, time and space---structure in hypermedia systems: links, objects, time and space---structure in hypermedia systems, (66-76)
  322. Naor M and Nissim K Certificate revocation and certificate update Proceedings of the 7th conference on USENIX Security Symposium - Volume 7, (17-17)
  323. Perkins C (1998). Mobile Networking Through Mobile IP, IEEE Internet Computing, 2:1, (58-69), Online publication date: 1-Jan-1998.
  324. ACM
    Mittra S (1997). Iolus, ACM SIGCOMM Computer Communication Review, 27:4, (277-288), Online publication date: 1-Oct-1997.
  325. ACM
    Mittra S and Woo T (1997). A flow-based approach to datagram security, ACM SIGCOMM Computer Communication Review, 27:4, (221-234), Online publication date: 1-Oct-1997.
  326. ACM
    Mittra S Iolus Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (277-288)
  327. ACM
    Mittra S and Woo T A flow-based approach to datagram security Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication, (221-234)
  328. ACM
    Patel B and Crowcroft J Ticket based service access for the mobile user Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (223-233)
  329. Small C A tool for constructing safe extensible C++ systems Proceedings of the 3rd conference on USENIX Conference on Object-Oriented Technologies (COOTS) - Volume 3, (13-13)
  330. ACM
    Browne S and Moore J (1997). Reuse library interoperability and the World Wide Web, ACM SIGSOFT Software Engineering Notes, 22:3, (182-189), Online publication date: 1-May-1997.
  331. ACM
    Hollingsworth J and Miller E (1997). Using content-derived names for configuration management, ACM SIGSOFT Software Engineering Notes, 22:3, (104-109), Online publication date: 1-May-1997.
  332. ACM
    Browne S and Moore J Reuse library interoperability and the World Wide Web Proceedings of the 1997 symposium on Software reusability, (182-189)
  333. ACM
    Hollingsworth J and Miller E Using content-derived names for configuration management Proceedings of the 1997 symposium on Software reusability, (104-109)
  334. ACM
    Browne S and Moore J Reuse library interoperability and the World Wide Web Proceedings of the 19th international conference on Software engineering, (684-691)
  335. Janson P, Tsudik G and Yung M Scalability and Flexibility in Authentication Services Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
  336. ACM
    Haber S and Stornetta W Secure names for bit-strings Proceedings of the 4th ACM conference on Computer and communications security, (28-35)
  337. Barsky D and Shafarenko A WWW and Java-based distributed examination system for distance learning applications Proceedings of the 2nd AIZU International Symposium on Parallel Algorithms / Architecture Synthesis
  338. ACM
    Perkins C and Johnson D Mobility support in IPv6 Proceedings of the 2nd annual international conference on Mobile computing and networking, (27-37)
  339. Trocki J PC Administration Tools: Using Linux to Manage Personal Computers Proceedings of the 10th USENIX conference on System administration, (187-192)
  340. ACM
    Mullender S and van der Valk M Simulating wide-area replication Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications, (267-274)
  341. Bellovin S Problem areas for the IP security protocols Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (21-21)
  342. Ylönen T SSH Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (4-4)
  343. Zúquete A and Guedes P (1996). Transparent Authentication and Confidentiality for Stream Sockets, IEEE Micro, 16:3, (34-41), Online publication date: 1-Jun-1996.
  344. Reiss S Simplifying data integration Proceedings of the 18th international conference on Software engineering, (398-407)
  345. Franklin M and Reiter M (1996). The Design and Implementation of a Secure Auction Service, IEEE Transactions on Software Engineering, 22:5, (302-312), Online publication date: 1-May-1996.
  346. Prabhu M and Raghavan S (1996). Tutorial, Computer Communications, 19:5, (379-388), Online publication date: 1-May-1996.
  347. Malki D and Reiter M A High-Throughput Secure Reliable Multicast Protocol Proceedings of the 9th IEEE workshop on Computer Security Foundations
  348. Small C and Seltzer M A comparison of OS extension technologies Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, (4-4)
  349. ACM
    Jakobsson M and Yung M Revokable and versatile electronic money (extended abstract) Proceedings of the 3rd ACM conference on Computer and communications security, (76-87)
  350. ACM
    Reiter M, Franklin M, Lacy J and Wright R The Ω key management service Proceedings of the 3rd ACM conference on Computer and communications security, (38-47)
  351. ACM
    Samfat D, Molva R and Asokan N Untraceability in mobile networks Proceedings of the 1st annual international conference on Mobile computing and networking, (26-36)
  352. ACM
    Touch J (1995). Performance analysis of MD5, ACM SIGCOMM Computer Communication Review, 25:4, (77-86), Online publication date: 1-Oct-1995.
  353. ACM
    Touch J Performance analysis of MD5 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, (77-86)
  354. ACM
    Browne S, Dongarra J, Green S, Moore K, Pepin T, Rowan T and Wade R (1995). Location-independent naming for virtual distributed software repositories, ACM SIGSOFT Software Engineering Notes, 20:SI, (179-185), Online publication date: 1-Aug-1995.
  355. ACM
    Browne S, Dongarra J, Green S, Moore K, Pepin T, Rowan T and Wade R Location-independent naming for virtual distributed software repositories Proceedings of the 1995 Symposium on Software reusability, (179-185)
  356. ACM
    Steiner M, Tsudik G and Waidner M (1995). Refinement and extension of encrypted key exchange, ACM SIGOPS Operating Systems Review, 29:3, (22-30), Online publication date: 1-Jul-1995.
  357. Galvin J and Feldman M MIME object security services Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (20-20)
  358. Rubin A Independent one-time passwords Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (15-15)
  359. Kim G, Orman H and O'Malley S Implementing a secure rlogin environment Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (7-7)
  360. ACM
    Bellare M, Goldreich O and Goldwasser S Incremental cryptography and application to virus protection Proceedings of the twenty-seventh annual ACM symposium on Theory of computing, (45-56)
  361. ACM
    Molva R and Rütsche E Application access control at network level Proceedings of the 2nd ACM Conference on Computer and communications security, (219-228)
  362. ACM
    van Oorschot P and Wiener M Parallel collision search with application to hash functions and discrete logarithms Proceedings of the 2nd ACM Conference on Computer and communications security, (210-218)
  363. ACM
    Gong L New protocols for third-party-based authentication and secure broadcast Proceedings of the 2nd ACM Conference on Computer and communications security, (176-183)
  364. ACM
    Reiter M Secure agreement protocols Proceedings of the 2nd ACM Conference on Computer and communications security, (68-80)
  365. ACM
    Kim G and Spafford E The design and implementation of tripwire Proceedings of the 2nd ACM Conference on Computer and communications security, (18-29)
  366. Schneier B Designing encryption algorithms for real people Proceedings of the 1994 workshop on New security paradigms, (98-101)
  367. Blackwell T, Chan K, Chang K, Charuhas T, Gwertzman J, Karp B, Kung H, Li W, Lin D, Morris R, Polansky R, Tang D, Young C and Zao J Secure short-cut routing for mobile IP Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (21-21)
  368. Woo T, Bindignavle R, Su S and Lam S SNP Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1, (4-4)
  369. Lidl K, Osborne J and Malcolm J Drinking from the firehose Proceedings of the USENIX Winter 1994 Technical Conference on USENIX Winter 1994 Technical Conference, (5-5)
  370. ACM
    Bellare M and Rogaway P Random oracles are practical Proceedings of the 1st ACM conference on Computer and communications security, (62-73)
  371. Johnson J Identifying redundancy in source code using fingerprints Proceedings of the 1993 conference of the Centre for Advanced Studies on Collaborative research: software engineering - Volume 1, (171-183)
  372. ACM
    Kumar B and Crowcroft J (1993). Integrating security in inter-domain routing protocols, ACM SIGCOMM Computer Communication Review, 23:5, (36-51), Online publication date: 1-Oct-1993.
  373. ACM
    Kent S (1993). Internet Privacy Enhanced Mail, Communications of the ACM, 36:8, (48-60), Online publication date: 1-Aug-1993.
  374. ACM
    Kumar B (1993). Integration of security in network routing protocols, ACM SIGSAC Review, 11:2, (18-25), Online publication date: 1-Apr-1993.
Contributors
  • MIT Computer Science & Artificial Intelligence Laboratory

Recommendations