A.J. Ballardie and J. Crowcroft.
Multicast-Specific Security Threats and Counter-Measures.
In Proceedings of the Internet Society Symposium on Network and
Distributed System Security, San Diego, California, February 1995.
L. Gong.
Optimal Authentication Protocols Resistant to Password Guessing
Attacks.
In Proceedings of the 8th IEEE Computer Security Foundations
Workshop, pages 24-29, County Kerry, Ireland, June 1995.
L. Gong and N. Shacham.
Multicast Security and Its Extension to a Mobile Environment.
ACM-Baltzer Journal of Wireless Networks, 1(3):281-295,
October 1995.
L. Gong and P. Syverson.
Fail-Stop Protocols: An Approach to Designing Secure Protocols.
In Proceedings of the 5th IFIP Working Conference on Dependable
Computing for Critical Applications, Dependable Computing and Fault-Tolerant
Systems, pages 44-55, Urbana-Champaign, Illinois, September 1995.
Springer-Verlag.
M. Reiter.
Secure Agreement Protocols: Reliable and Atomic Group Multicast in
Rampart.
In Proceedings of the 2nd ACM Conference on Computer and
Communications Security, pages 68-80, Fairfax, Virginia, November 1994.
M. Roseman and S. Greenberg.
Building Real Time Groupware with GroupKit, a Groupware Toolkit.
ACM Transactions on Computer Human Interaction, 1996.
To appear.
T. Takahashi, A. Shimbo, and M. Murota.
File-Based Network Collaboration System.
In Proceedings of the 5th USENIX UNIX Security Symposium, pages
95-104, Salt Lake City, Utah, June 1995.