Jonathan T. Trostle

According to our database1, Jonathan T. Trostle authored at least 16 papers between 1991 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
CMCC: Misuse Resistant Authenticated Encryption with Minimal Ciphertext Expansion.
Cryptogr., 2018

2013
Cryptographically Protected Prefixes for Location Privacy in IPv6.
IACR Cryptol. ePrint Arch., 2013

Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion.
IACR Cryptol. ePrint Arch., 2013

2008
New Side Channels Targeted at Passwords.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups.
IACR Cryptol. ePrint Arch., 2007

2006
Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

The lightweight key management protocol (LKMP).
Proceedings of the Third IASTED International Conference on Communication, 2006

2005
Techniques for improving the security and manageability of IPsec policy.
Int. J. Inf. Sec., 2005

2004
Cryptographically Protected Prefixes for Location Privacy in IPv6.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004

2002
Microsoft Windows 2000 Kerberos Change Password and Set Password Protocols.
RFC, February, 2002

2001
Implementation of Crossrealm Referral Handling in the MIT Kerberos Client.
Proceedings of the Network and Distributed System Security Symposium, 2001

1998
Timing Attacks Against Trusted Path.
Proceedings of the Security and Privacy, 1998

1996
A flexible distributed authorization protocol.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

1994
Applicability of Smart Cards to Network User Authentication.
Comput. Syst., 1994

1993
Modelling a Fuzzy Time System.
J. Comput. Secur., 1993

1991
Multiple Trojan Horse Systems and Covert Channel Analysis.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991


  Loading...