1994 Publications of the Network Security Group IBM Research

1994 Publications of the Network Security Group


The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

[ 2000 1999 1998 1997 1996 1995 1994 1993 1992 1991 ]

Ralf Hauser. Does licensing require new access control techniques? Communications of the ACM, 37(11):48-55, November 1994. Originally presented at the 1st ACM Conference on Computer and Communications Security, Nov. 3-5, 1993, Fairfax, Virginia.
online: hauser@acm.org.

Ralf Hauser, Phil Janson, Refik Molva, Gene Tsudik, and Els Van Herreweghen. Robust and secure password/key change method. In Dieter Gollmann, editor, Proceedings of the Third European Symposium on Research in Computer Security (ESORICS), volume 875 of Lecture Notes in Computer Science, pages 107-122, Brighton, UK, November 1994. Springer-Verlag, Berlin Germany. A later version is also available [HJTtex2html_wrap_inline13096].
online: HJMTV94.ps.gz , HJMTV94.tex.

Ralf Hauser, Phil Janson, Gene Tsudik, Els Van Herreweghen, and Refik Molva. Robust and secure password and key change method. Journal of Computer Security, 4(1):97-111, September 1996.
online: HJMTvH.ps.gz.

Ralf Hauser, Günter Karjoth, and Michael Steiner. Management von sicherheitsdiensten in verteilten systemen. In Prof. Dr. Kurt Bauknecht and Dr. Stephanie Teufel, editors, Sicherheit in Informationssystemen SIS'94, Proceedings der Fachtagung SIS '94, Universität Zürich-Irchel, Institut für Informatik, pages 7-21. vdf Verlag der Fachvereine Zürich, March 1994.
online: SIS94.ps , final.ps.gz , final.html, final.ps.gz , final.html.

Amir Herzberg, Hugo Krawczyk, and Gene Tsudik. On travelling Incognito. In IEEE Workshop on Mobile Computing Systems and Applications, Sata Cruz, CA, December 1994.
online: http://snapple.cs.washington.edu:600/mobile/mcsa94.html, hkt94.ps.Z.

Ralf Hauser and Stefano Zatti. Security, authentication, and policy management in open distributed systems. In Technical Committee TC 11 of the International Federation for Information Processing IFIP, editor, 10th International Information Security Conference IFIP SEC'94, Curacao, Dutch Antilles, May 1994. Elsevier Science Publishers B.V. In preliminary conference proceedings: Paper C6.
online: HaZa93.ps.gz , IFIP-Sec94-Samson.ps.Z.enc, HaZa93.ps.gz.

Phil Janson and Gene Tsudik. Secure and minimal protocols for authenticated key distribution. Computer Communications Journal, 1994.
online: jt94.ps.Z.

Phil Janson and Stefano Zatti. Security and management services in open networks and distributed systems. In M. Sloman and K. Kappel, editors, Distributed Systems and Network Management, pages 403-431. Addison Wesley, 1994.

Refik Molva, Didier Samfat, and Gene Tsudik. Authentication of mobile users. IEEE Network, 8(2):26-35, March/April 1994.
online: mst94.ps.Z.

[ 2000 1999 1998 1997 1996 1995 1994 1993 1992 1991 ]

Els Van Herreweghen
Wed Oct 18 10:22:20 MDT 2000