|
Search the dblp DataBase
Peter Gutmann:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Peter Gutmann
A Reliable, Scalable General-Purpose Certificate Store. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:278-287 [Conf]
- Peter Gutmann
Lessons Learned in Implementing and Deploying Crypto Software. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:315-325 [Conf]
- Peter Gutmann
PKI: It's Not Dead, Just Resting. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2002, v:35, n:8, pp:41-49 [Journal]
- Peter Gutmann
Simplifying Public Key Management. [Citation Graph (0, 0)][DBLP] IEEE Computer, 2004, v:37, n:2, pp:101-103 [Journal]
- Peter Gutmann, Ian Grigg
Security Usability. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:4, pp:56-58 [Journal]
- Peter Gutmann, David Naccache, Charles C. Palmer
When Hashes Collide. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:3, pp:68-71 [Journal]
- Jenny Shearer, Peter Gutmann
Government, Cryptography, and the Right to Privacy. [Citation Graph (0, 0)][DBLP] J. UCS, 1996, v:2, n:3, pp:113-146 [Journal]
- Peter Gutmann
PKI design for the real world. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:109-116 [Conf]
Search in 0.001secs, Finished in 0.002secs
|