Subject
Law,Hardware and Architecture,Software
Reference16 articles.
1. R. Anderson, R. Needham, Robustness principles for public key protocols, Research notes.
2. R. Bird et al., Systematic design of two-party authentication protocols, Advances in Cryptology — CRYPTO '91, 1991, pp. 44–61.
3. Systematic design of a family if attack-resistant authentication protocols;Bird;IEEE Journal on Selected Areas in Communications,1993
4. G.C. Chick, S.E. Tavares, Flexible access control with master keys, in: Proc. CRYPTO '89, Santa Barbara, CA, August 1989.
5. R. Cocchi et al., A study of priority pricing in multiple service class networks, Proceedings of ACM SIGCOMM 1991 Conference, pp. 123–130.