Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Charlie Kaufman
@article{DBLP:journals/rfc/rfc7296, author = {Charlie Kaufman and Paul E. Hoffman and Yoav Nir and Pasi Eronen and Tero Kivinen}, title = {Internet Key Exchange Protocol Version 2 (IKEv2)}, journal = {{RFC}}, volume = {7296}, pages = {1--142}, year = {2014}, url = {https://doi.org/10.17487/RFC7296}, doi = {10.17487/RFC7296}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7296.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/PerlmanK13, author = {Radia J. Perlman and Charlie Kaufman}, title = {Byzantine robustness, hierarchy, and scalability}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {242--250}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682713}, doi = {10.1109/CNS.2013.6682713}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/PerlmanK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpsr/AtovKP12, author = {Irena Atov and Charlie Kaufman and Radia J. Perlman}, editor = {Aleksandra Smiljanic and Mounir Hamdi and H. Jonathan Chao and Eiji Oki and Cyriel Minkenberg}, title = {Scalable per-flow resource management for large hierarchical networks}, booktitle = {13th {IEEE} International Conference on High Performance Switching and Routing, {HPSR} 2012, Belgrade, Serbia, June 24-27, 2012}, pages = {160--167}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/HPSR.2012.6260844}, doi = {10.1109/HPSR.2012.6260844}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/hpsr/AtovKP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kaufman11, author = {Charlie Kaufman}, editor = {Christian Cachin and Thomas Ristenpart}, title = {What's different about security in a public cloud?}, booktitle = {Proceedings of the 3rd {ACM} Cloud Computing Security Workshop, {CCSW} 2011, Chicago, IL, USA, October 21, 2011}, pages = {27--28}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046660.2046668}, doi = {10.1145/2046660.2046668}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kaufman11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/comsnets/PerlmanK11, author = {Radia J. Perlman and Charlie Kaufman}, editor = {David B. Johnson and Anurag Kumar}, title = {Hierarchical networks with Byzantine Robustness}, booktitle = {Third International Conference on Communication Systems and Networks, {COMSNETS} 2011, Bangalore, India, January 4-8, 2011}, pages = {1--11}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/COMSNETS.2011.5716503}, doi = {10.1109/COMSNETS.2011.5716503}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/comsnets/PerlmanK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idtrust/PerlmanKP10, author = {Radia J. Perlman and Charlie Kaufman and Ray A. Perlner}, editor = {Ken Klingenstein and Carl M. Ellison}, title = {Privacy-preserving {DRM}}, booktitle = {Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010}, pages = {69--83}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1750389.1750399}, doi = {10.1145/1750389.1750399}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idtrust/PerlmanKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5996, author = {Charlie Kaufman and Paul E. Hoffman and Yoav Nir and Pasi Eronen}, title = {Internet Key Exchange Protocol Version 2 (IKEv2)}, journal = {{RFC}}, volume = {5996}, pages = {1--138}, year = {2010}, url = {https://doi.org/10.17487/RFC5996}, doi = {10.17487/RFC5996}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5996.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/idtrust/PerlmanK08, author = {Radia J. Perlman and Charlie Kaufman}, editor = {Kent E. Seamons and Neal McBurnett and Tim Polk}, title = {User-centric {PKI}}, booktitle = {IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, {USA}}, series = {{ACM} International Conference Proceeding Series}, volume = {283}, pages = {59--71}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1373290.1373300}, doi = {10.1145/1373290.1373300}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/idtrust/PerlmanK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc4306, author = {Charlie Kaufman}, title = {Internet Key Exchange (IKEv2) Protocol}, journal = {{RFC}}, volume = {4306}, pages = {1--99}, year = {2005}, url = {https://doi.org/10.17487/RFC4306}, doi = {10.17487/RFC4306}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc4306.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KaufmanPS03, author = {Charlie Kaufman and Radia J. Perlman and Bill Sommerfeld}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {DoS protection for UDP-based protocols}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {2--7}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948113}, doi = {10.1145/948109.948113}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KaufmanPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3631, author = {Steven M. Bellovin and Jeffrey I. Schiller and Charlie Kaufman}, title = {Security Mechanisms for the Internet}, journal = {{RFC}}, volume = {3631}, pages = {1--20}, year = {2003}, url = {https://doi.org/10.17487/RFC3631}, doi = {10.17487/RFC3631}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3631.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZurkoKSB02, author = {Mary Ellen Zurko and Charlie Kaufman and Katherine Spanbauer and Chuck Bassett}, title = {Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With {A} Security Decision}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {371--381}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176309}, doi = {10.1109/CSAC.2002.1176309}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZurkoKSB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KaufmanAP01, author = {Charlie Kaufman and Radia J. Perlman}, editor = {Dan S. Wallach}, title = {{PDM:} {A} New Strong Password-Based Protocol}, booktitle = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington, D.C., {USA}}, publisher = {{USENIX}}, year = {2001}, url = {http://www.usenix.org/publications/library/proceedings/sec01/kaufman.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/KaufmanAP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/PerlmanK01, author = {Radia J. Perlman and Charlie Kaufman}, title = {Analysis of the IPSec Key Exchange Standard}, booktitle = {10th {IEEE} International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises {(WETICE} 2001), 20-22 June 2001, Cambridge, MA, {USA}}, pages = {150--156}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ENABL.2001.953405}, doi = {10.1109/ENABL.2001.953405}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/PerlmanK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/PerlmanK00, author = {Radia J. Perlman and Charlie Kaufman}, title = {Key Exchange in IPSec: Analysis of {IKE}}, journal = {{IEEE} Internet Comput.}, volume = {4}, number = {6}, pages = {50--56}, year = {2000}, url = {https://doi.org/10.1109/4236.895016}, doi = {10.1109/4236.895016}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/internet/PerlmanK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/PerlmanK99, author = {Radia J. Perlman and Charlie Kaufman}, title = {Secure Password-Based Protocol for Downloading a Private Key}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/secure-password-based-protocol-downloading-private-key/}, timestamp = {Mon, 01 Feb 2021 08:42:19 +0100}, biburl = {https://dblp.org/rec/conf/ndss/PerlmanK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0077396, author = {Charlie Kaufman and Radia J. Perlman and Mike Speciner}, title = {Network security - private communication in a public world}, series = {Prentice Hall series in computer networking and distributed systems}, publisher = {Prentice Hall}, year = {1995}, isbn = {978-0-13-061466-7}, timestamp = {Fri, 08 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0077396.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.