Check out the new USENIX Web site. next up previous
Next: About this document Up: Enclaves: Enabling Secure Collaboration Previous: Acknowledgements

References

1
R.J. Anderson. Why Cryptosystems Fail. Communications of the ACM, 37(11):32-40, November 1994.

2
A.J. Ballardie and J. Crowcroft. Multicast-Specific Security Threats and Counter-Measures. In Proceedings of the Internet Society Symposium on Network and Distributed System Security, San Diego, California, February 1995.

3
K.P. Birman. The Process Group Approach to Reliable Distributed Computing. Communications of the ACM, 36(12):37-53/103, December 1993.

4
W.R. Cheswick and S.M. Bellovin. Firewalls and Internet Security. Addison-Wesley, 1994.

5
D. Coleman and R. Khanna, editors. Groupware Technology and Applications. Prentice-Hall, Upper Saddle River, New Jersey, 1995.

6
S. Deering. Host Extensions for IP Multicasting. Request for Comments 1112, Internet Network Working Group, August 1989.

7
H. Eriksson. MBONE: The Multicast Backbone. Communications of the ACM, 37(8):54-60, August 1994.

8
L. Gong. Optimal Authentication Protocols Resistant to Password Guessing Attacks. In Proceedings of the 8th IEEE Computer Security Foundations Workshop, pages 24-29, County Kerry, Ireland, June 1995.

9
L. Gong and N. Shacham. Multicast Security and Its Extension to a Mobile Environment. ACM-Baltzer Journal of Wireless Networks, 1(3):281-295, October 1995.

10
L. Gong and P. Syverson. Fail-Stop Protocols: An Approach to Designing Secure Protocols. In Proceedings of the 5th IFIP Working Conference on Dependable Computing for Critical Applications, Dependable Computing and Fault-Tolerant Systems, pages 44-55, Urbana-Champaign, Illinois, September 1995. Springer-Verlag.

11
M. Knister and A. Prakash. Issues in the Design of a Toolkit for Supporting Multiple Group Editors. Computing Systems, 6(2):135-166, Spring 1993.

12
D.E. Knuth. The Art of Computer Programming, Vol.2: Seminumerical Algorithms. Addison-Wesley, Reading, Massachusetts, 1969. Revised edition.

13
J.K. Ousterhout. Tcl and the Tk Toolkit. Addison Wesley, Menlo Park, California, 1994.

14
M. Reiter. Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68-80, Fairfax, Virginia, November 1994.

15
M. Roseman and S. Greenberg. Building Real Time Groupware with GroupKit, a Groupware Toolkit. ACM Transactions on Computer Human Interaction, 1996. To appear.

16
T. Takahashi, A. Shimbo, and M. Murota. File-Based Network Collaboration System. In Proceedings of the 5th USENIX UNIX Security Symposium, pages 95-104, Salt Lake City, Utah, June 1995.


Li Gong
Fri May 17 15:07:56 PDT 1996
?Need help? Use our Contacts page.

Last changed: 1 May 2002 aw
Conference Index
USENIX home