Publications

Export 13 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Authentication  [Clear All Filters]
2010
Chow R, Jakobsson M, Masuoka R, Molina J, Niu Y, Elaine Shi, Song Z.  2010.  Authentication in the clouds: a framework and its application to mobile users. :1-6.
2009
Erway C, Küp\ccü A, Papamanthou C, Tamassia R.  2009.  Dynamic Provable Data Possession. CCS '09 Proceedings of the 16th ACM Conference on Computer and Communications Security . :213-222.
Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
2008
Papamanthou C, Tamassia R, Triandopoulos N.  2008.  Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
Ramachandran AV, Feamster N.  2008.  Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2006
Shin M, Ma J, Mishra A, Arbaugh WA.  2006.  Wireless Network Security and Interworking. Proceedings of the IEEE. 94(2):455-466.
2004
Mishra A, Shin M H, Petroni NL, Clancy TC, Arbaugh WA.  2004.  Proactive key distribution using neighbor graphs. IEEE Wireless Communications. 11(1):26-36.
2003
Wu M.  2003.  Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
Hicks MW, Keromytis AD, Smith JM.  2003.  A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2002
Hicks MW, Keromytis AD, Smith JM.  2002.  A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
1999
M. Wu, Liu B.  1999.  Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
1998
Alexander DS, Arbaugh WA, Keromytis AD, Smith JM.  1998.  A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.
Alexander DS, Arbaugh WA, Hicks MW, Kakkar P, Keromytis AD, Moore JT, Gunter CA, Nettles SM, Smith JM.  1998.  The SwitchWare active network architecture. IEEE Network. 12(3):29-36.