Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaling the Web of Trust: Combining Kerberos and PGP to Provide Large Scale Authentication., and . USENIX Winter, page 83-94. USENIX Association, (1995)Cryptographic Algorithms for Use in the Internet Key Exchange Version 2 (IKEv2).. RFC, (December 2005)Strong Security Requirements for Internet Engineering Task Force Standard Protocols.. RFC, (August 2002)Bugs in our pockets: the risks of client-side scanning., , , , , , , , , and 4 other author(s). J. Cybersecur., (January 2024)Bugs in our Pockets: The Risks of Client-Side Scanning., , , , , , , , , and 4 other author(s). CoRR, (2021)Keys under doormats: mandating insecurity by requiring government access to all data and communications., , , , , , , , , and 5 other author(s). J. Cybersecur., 1 (1): 69-79 (2015)Kerberos: An Authentication Service for Open Network Systems., , and . USENIX Winter, page 191-202. USENIX Association, (1988)The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption, , , , , , , , , and 1 other author(s). A Report by an Ad Hoc Group of Cryptographers and Computer Scientists, (1998)Security Mechanisms for the Internet., , and . RFC, (December 2003)Randomness Requirements for Security., , and . RFC, (June 2005)