Proxy-based security protocols in networked mobile devices release_44kwvxz6zbbo7feh7bpctdks3m

by M. Burnside, D. Clarke, T. Mills, A. Maywah, S. Devadas, R. Rivest

Published in ACM Symposium on Applied Computing by ACM Press.

2002   p265-272

Archived Files and Locations

application/pdf  325.2 kB
file_moymkrub65gihf2tb4c65454ae
www.ai.mit.edu (web)
web.archive.org (webarchive)
web.archive.org (webarchive)
application/pdf  337.9 kB
file_yqnctezbybgwnpgitnqwbojjfm
web.archive.org (webarchive)
csg.csail.mit.edu (web)
application/pdf  97.9 kB
file_sxp4b3afjbhjvbh3paoqxugn2u
web.archive.org (webarchive)
web.archive.org (webarchive)
web.archive.org (webarchive)
web.archive.org (webarchive)
www.cs.columbia.edu (web)
application/pdf  23.5 kB
file_qb6esdnahraapjz7vnobpjipyi
web.archive.org (webarchive)
csg.csail.mit.edu (web)
application/pdf  146.6 kB
file_ux7cg7mk5jhl5ose53pzz3cb6i
web.archive.org (webarchive)
citeseer.comp.nus.edu.sg (web)
application/pdf  759.1 kB
file_o7q4eufcorernligcuxhyx2wq4
web.archive.org (webarchive)
web.archive.org (webarchive)
people.csail.mit.edu (web)
application/pdf  98.0 kB
file_dadj5jvm4nhmpdryjkaedtimua
www.net-security.org:80 (web)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2002
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 0af4886b-e4b0-4d3d-85c6-b8b40bca7094
API URL: JSON