Authentication Metric Analysis and Design (1999)

by Michael K. Reiter
Venue:ACM Transactions on Information and System Security
Citations:82 - 1 self

Active Bibliography

49 Toward acceptable metrics of authentication – M K Reiter, S G Stubblebine - 1997
33 Path Independence for Authentication in Large-Scale Systems – Michael K. Reiter, Stuart G. Stubblebine - 1996
871 Wireless Ad Hoc Networks – Zygmunt J. Haas, Jing Deng, Ben Liang, Panagiotis Papadimitratos, S. Sajama - 2002
550 A new approach to the maximum flow problem – Andrew V. Goldberg, Robert E. Tarjan - 1988
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
426 Small Byzantine Quorum Systems – Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin - 2001
776 The EigenTrust Algorithm for Reputation Management in P2P Networks – Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-molina - 2003
889 Decentralized Trust Management – Matt Blaze, Joan Feigenbaum, Jack Lacy - 1996
2724 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997