By year

2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001 | 2000 | 1999 | 1998 | 1997 | 1996 | 1995 | 1994 | 1993 | 1992 | 1991 |


  1. [Hau94]
    Ralf Hauser.
    Does licensing require new access control techniques? Communications of the ACM, 37(11):48-55, November 1994. Originally presented at the 1st ACM Conference on Computer and Communications Security, Nov. 3-5, 1993, Fairfax, Virginia.
  2. [HJM+94]
    Ralf Hauser, Phil Janson, Refik Molva, Gene Tsudik, and Els Van Herreweghen.
    Robust and secure password/key change method. In Dieter Gollmann, editor, Proceedings of the 3rd European Symposium on Research in Computer Security (ESORICS), volume 875 of Lecture Notes in Computer Science, pages 107-122. Springer-Verlag, Berlin Germany, November 1994. A later version is also available  [HJMTvH96]. (Postscript)
  3. [HKS94]
    Ralf Hauser, Günter Karjoth, and Michael Steiner.
    Management von sicherheitsdiensten in verteilten systemen. In Kurt Bauknecht and Stephanie Teufel, editors, Sicherheit in Informationssystemen SIS'94, Proceedings der Fachtagung SIS '94, Universität Zürich-Irchel, Institut für Informatik, pages 7-21. vdf Verlag der Fachvereine Zürich, March 1994. (Postscript)
  4. [HZ94]
    Ralf Hauser and Stefano Zatti.
    Security, authentication, and policy management in open distributed systems. In Technical Committee TC 11 of the International Federation for Information Processing IFIP, editor, 10th International Information Security Conference IFIP SEC'94, Curacao, Dutch Antilles, May 1994. Elsevier Science Publishers B.V. In preliminary conference proceedings: Paper C6. (Postscript)
  5. [HKT94]
    Amir Herzberg, Hugo Krawczyk, and Gene Tsudik.
    On travelling Incognito. In IEEE Workshop on Mobile Computing Systems and Applications, Sata Cruz, CA, December 1994.
  6. [JT94]
    Phil Janson and Gene Tsudik.
    Secure and minimal protocols for authenticated key distribution. Computer Communications Journal, 1994. (Postscript)
  7. [JZ94]
    Phil Janson and Stefano Zatti.
    Security and management services in open networks and distributed systems. In M. Sloman and K. Kappel, editors, Distributed Systems and Network Management, pages 403-431. Addison Wesley, 1994.
  8. [MST94]
    Refik Molva, Didier Samfat, and Gene Tsudik.
    Authentication of mobile users. IEEE Network, 8(2):26-35, March/April 1994. (Postscript)


The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.