What people are saying - Write a review
We haven't found any reviews in the usual places.
Cryptographic Credit Control in PrePayment Metering Systems
Holding Intruders Accountable on the Internet
What to do While Waiting for the Millenium
12 other sections not shown
Other editions - View all
abort access class access control access control lists actions algorithm analysis application architecture assumption attacker bidder buffer CanProve certificate channel capacity client communication Computer Security concurrency control CORBA covert channel covert channel capacity cryptographic data model database decryption deterministic discussed distributed domain DTEL elastically separable encrypted example Figure file system flaws GARNETS hardware idle slots implementation initial input interface invoice kernel labels mechanism meter mobile computers multicast multilevel Multilevel Secure network Pump node non-interference number of idle object operation output paper performance postulates private key problem processor properties protocol public key realtime network revocation scheduling scheme Security and Privacy security levels segment semantics sequence signature specification statement strictly dominated task techniques Theta thumbprints timestamp tion traffic transaction trusted tuple type enforcement UNIX version pool