Jerome H. Saltzer (Author)
Reports on the special features and applications supported by Kerberos, a cryptographic authentication and key distribution system developed by MIT Project Athena with the goal that a single login provide access to many different computing services. Kerberos is distributed as a component of most major operating systems, including Microsoft Windows, Apple OS/X and IOS, IBM z/OS, and many versions of Unix.
...More
Book
Lennon, Brian;
(2018)
Passwords: philology, security, authentication
(/isis/citation/CBB427866448/)
Article
T. Alex Reid;
(2023)
Monte Sala's Cryptographic Achievements
(/isis/citation/CBB117246267/)
Book
Jones, C.B.;
Lloyd, J.L.;
(2011)
Dependable and Historic Computing: Essays Dedicated to Brian Randell on the Occasion of his 75th Birthday
(/isis/citation/CBB511443626/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Jérôme Baudry;
Élise Tancoigne;
Bruno J Strasser;
(June 2022)
Turning crowds into communities: The collectives of online citizen science
(/isis/citation/CBB205266249/)
Article
Jérôme Lamy;
(2021)
Matérialité du faux : à propos d’un exemplaire contrefait du Sidereus nuncius de Galilée
(/isis/citation/CBB526705576/)
Book
Luca Zamparo;
Monica Salvadori;
Elisa Bernard;
Monica Baggio;
(2019)
Anthropology of Forgery: A Multidisciplinary Approach to the Study of Archaeological Fakes
(/isis/citation/CBB719395081/)
Book
Cécile Michel;
Michael Friedrich;
(2020)
Fakes and Forgeries of Written Artefacts from Ancient Mesopotamia to Modern China
(/isis/citation/CBB397878352/)
Article
Tilke Nelis;
(2022)
A Jumble of Writings: Commentaries on Aristotle’s De Longitudine et Brevitate Vitae Attributed to Adam of Buckfield
(/isis/citation/CBB301399516/)
Article
Paul McJones;
David Redell;
(2023)
History of the CAL Timesharing System
(/isis/citation/CBB342369305/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/isis/citation/CBB201310866/)
Thesis
Gili Vidan;
(2021)
Trading on Trust: Cryptographic Authentication and Digital Decentralization in the United States, 1968–2000
(/isis/citation/CBB882929007/)
Book
Richard Coyne;
(2023)
Cryptographic City: Decoding the Smart Metropolis
(/isis/citation/CBB732227675/)
Article
Thomas Haigh;
Mark Priestley;
(July 2020)
Contextualizing Colossus: Codebreaking Technology and Institutional Capabilities
(/isis/citation/CBB455159316/)
Book
Guido Braun;
Susanne Lachenicht;
(2020)
Spies, Espionage and Secret Diplomacy in the Early Modern Period.
(/isis/citation/CBB447003065/)
Article
Vijay Sivaraman;
Hassan Habibi Gharakheili;
Clinton Fernandes;
Narelle Clark;
Tanya Karliychuk;
(June 2018)
Smart IoT Devices in the Home: Security and Privacy Implications
(/isis/citation/CBB353680957/)
Article
Emilio Matricciani;
Tullia Norando;
Paola Magnaghi Delfino;
(2013)
How did Polybius perfect Cleoxenus and Democleitus signalling method, 2200 years ago?
(/isis/citation/CBB345497918/)
Book
Andrew Hodges;
Douglas Hofstadter;
(2014)
Alan Turing: The Enigma: The Book That Inspired the Film "The Imitation Game"
(/isis/citation/CBB485951446/)
Book
Paolo Bonavoglia;
(2023)
La crittografia della Repubblica di Venezia
(/isis/citation/CBB820423644/)
Article
Nicholas Paul Sheppard;
(March 2020)
Can Smart Contracts Learn from Digital Rights Management?
(/isis/citation/CBB343046132/)
Be the first to comment!