Charlie Kaufman

According to our database1, Charlie Kaufman authored at least 17 papers between 1995 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Internet Key Exchange Protocol Version 2 (IKEv2).
RFC, October, 2014

2013
Byzantine robustness, hierarchy, and scalability.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Scalable per-flow resource management for large hierarchical networks.
Proceedings of the 13th IEEE International Conference on High Performance Switching and Routing, 2012

2011
Hierarchical networks with Byzantine Robustness.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

What's different about security in a public cloud?
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
Internet Key Exchange Protocol Version 2 (IKEv2).
RFC, September, 2010

Privacy-preserving DRM.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

2008
User-centric PKI.
Proceedings of the IDtrust 2008, 2008

2005
Internet Key Exchange (IKEv2) Protocol.
RFC, December, 2005

2003
Security Mechanisms for the Internet.
RFC, December, 2003

DoS protection for UDP-based protocols.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Analysis of the IPSec Key Exchange Standard.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

PDM: A New Strong Password-Based Protocol.
Proceedings of the 10th USENIX Security Symposium, 2001

2000
Key Exchange in IPSec: Analysis of IKE.
IEEE Internet Comput., 2000

1999
Secure Password-Based Protocol for Downloading a Private Key.
Proceedings of the Network and Distributed System Security Symposium, 1999

1995
Network security - private communication in a public world.
Prentice Hall series in computer networking and distributed systems, Prentice Hall, ISBN: 978-0-13-061466-7, 1995


  Loading...