Search the dblp DataBase
Jonathan T. Trostle :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jonathan T. Trostle Multiple Trojan Horse Systems and Covert Channel Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:22-33 [Conf ] Jonathan T. Trostle , Irina Kosinovsky , Michael M. Swift Implementation of Crossrealm Referral Handling in the MIT Kerberos Client. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Jonathan T. Trostle , Hosei Matsuoka , Muhammad Mukarram Bin Tariq , James Kempf , Toshiro Kawahara , Ravi Jain Cryptographically Protected Prefixes for Location Privacy in IPv6. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2004, pp:142-166 [Conf ] Jonathan T. Trostle The lightweight key management protocol (LKMP). [Citation Graph (0, 0)][DBLP ] Communication, Network, and Information Security, 2006, pp:104-112 [Conf ] Marjan Krajewski Jr. , John C. Chipchak , David A. Chodorow , Jonathan T. Trostle Applicability of Smart Cards to Network User Authentication. [Citation Graph (0, 0)][DBLP ] Computing Systems, 1994, v:7, n:1, pp:75-89 [Journal ] Jonathan T. Trostle , Bill Gossman Techniques for improving the security and manageability of IPsec policy. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:3, pp:209-226 [Journal ] Jonathan T. Trostle Modelling a Fuzzy Time System. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:4, pp:291-310 [Journal ] New Side Channels Targeted at Passwords. [Citation Graph (, )][DBLP ] Timing Attacks Against Trusted Path. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs