|
Search the dblp DataBase
Carl M. Ellison:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Carl M. Ellison
The Trust Shell Game (Position Paper). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1998, pp:36-40 [Conf]
- Carl M. Ellison
The Trust Shell Game (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1998, pp:41-44 [Conf]
- Carl M. Ellison, Bruce Schneier
Risks of PKI: Secure Email. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:1, pp:160- [Journal]
- Carl M. Ellison, Bruce Schneier
Risks of PKI: E-Commerce. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:2, pp:152- [Journal]
- Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson
Commercial Key Recovery. [Citation Graph (0, 0)][DBLP] Commun. ACM, 1996, v:39, n:3, pp:41-47 [Journal]
- Carl M. Ellison
The nature of a useable PKI. [Citation Graph (0, 0)][DBLP] Computer Networks, 1999, v:31, n:8, pp:823-830 [Journal]
- Dwaine E. Clarke, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest
Certificate Chain Discovery in SPKI/SDSI. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2001, v:9, n:4, pp:285-322 [Journal]
- Carl M. Ellison, Steve Dohrmann
Public-key support for group collaboration. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:547-565 [Journal]
- Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier
Protecting secret keys with personal entropy. [Citation Graph (0, 0)][DBLP] Future Generation Comp. Syst., 2000, v:16, n:4, pp:311-318 [Journal]
Search in 0.002secs, Finished in 0.003secs
|