Cited By
View all- (2019)A delegation token-based method to authenticate the third party in TLSInternational Journal of High Performance Computing and Networking10.5555/3319261.331926513:2(164-174)Online publication date: 1-Jan-2019
- Kogan DStern HTolbert AMazières DWinstein K(2017)The Case For Secure DelegationProceedings of the 16th ACM Workshop on Hot Topics in Networks10.1145/3152434.3152444(15-21)Online publication date: 30-Nov-2017
- Afanasyev AHalderman JRuoti SSeamons KYu YZappala DZhang LGates CBöhme REgelman SMannan M(2016)Content-based security for the webProceedings of the 2016 New Security Paradigms Workshop10.1145/3011883.3011890(49-60)Online publication date: 26-Sep-2016