Secure Password-Based Protocol for Downloading a Private Key
Radia Perlman and Charlie Kaufman
A Real World Abstract Analysis of Kerberos Password Security
Thomas Wu
Secure Remote Access to an Internal Web Server
Christian Gilmore, David Kormann and Avi Rubin
Experimenting with Shared Generation of RSA keys
Michael Malkin, Thomas Wu and Dan Boneh
Addressing the Problem of Undetected Signature Key Compromise
Mike Just and P. C. van Oorschot
Practical Approach to Anonymity in Large Scale Electronic Voting Schemes
Andreu Riera and Joan Borrell
Distributed Policy Management for JDK 1.2
Pekka Nikander and Jonna Partanen
Distributed Execution with Remote Audit
Fabian Monrose, Peter Wyckoff and Avi Rubin
An Algebra for Assessing Trust in Certification Chains
Audun Josang
PGRIP: PNNI Global Routing Infrastructure Protection
Livio Ricciulli, Pierangela Samarati, Patrick Lincoln and Sabrina De Capitani di Vimercati
Client Puzzles: A Cryptographic Defense Against Connection Depletion Attacks
Ari Juels and John Brainard