The SCEAS System
Navigation Menu

Search the dblp DataBase


Jonathan T. Trostle: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathan T. Trostle
    Multiple Trojan Horse Systems and Covert Channel Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:22-33 [Conf]
  2. Jonathan T. Trostle, Irina Kosinovsky, Michael M. Swift
    Implementation of Crossrealm Referral Handling in the MIT Kerberos Client. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  3. Jonathan T. Trostle, Hosei Matsuoka, Muhammad Mukarram Bin Tariq, James Kempf, Toshiro Kawahara, Ravi Jain
    Cryptographically Protected Prefixes for Location Privacy in IPv6. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:142-166 [Conf]
  4. Jonathan T. Trostle
    The lightweight key management protocol (LKMP). [Citation Graph (0, 0)][DBLP]
    Communication, Network, and Information Security, 2006, pp:104-112 [Conf]
  5. Marjan Krajewski Jr., John C. Chipchak, David A. Chodorow, Jonathan T. Trostle
    Applicability of Smart Cards to Network User Authentication. [Citation Graph (0, 0)][DBLP]
    Computing Systems, 1994, v:7, n:1, pp:75-89 [Journal]
  6. Jonathan T. Trostle, Bill Gossman
    Techniques for improving the security and manageability of IPsec policy. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:209-226 [Journal]
  7. Jonathan T. Trostle
    Modelling a Fuzzy Time System. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:4, pp:291-310 [Journal]

  8. New Side Channels Targeted at Passwords. [Citation Graph (, )][DBLP]

  9. Timing Attacks Against Trusted Path. [Citation Graph (, )][DBLP]

Search in 0.001secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002