Documents Related by Co-Citation

228 Password Security: A Case History – Robert Morris, Ken Thompson - 1979
1535 Security Architecture for the Internet Protocol – Randall Atkinson - 1995
2724 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
185 Deja Vu: A User Study Using Images for Authentication – Rachna Dhamija, Adrian Perrig
875 The MD5 message-digest algorithm – R Rivest - 1992
1947 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
657 Kerberos: An Authentication Service for Open Network Systems – Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller - 1988
860 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988