Documents Related by Co-Citation

216 Password Security: A Case History – Robert Morris, Ken Thompson - 1979
836 The MD5 Message-Digest Algorithm – R Rivest - 1992
1460 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
1813 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
172 Deja Vu: A User Study Using Images for Authentication – Rachna Dhamija, Adrian Perrig
828 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
911 The Design and Implementation of a Log-Structured File System – Mendel Rosenblum, John K. Ousterhout - 1992
635 Kerberos: An Authentication Service for Open Network Systems – Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - 1988
1360 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995