default search action
Carl M. Ellison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [r4]Carl M. Ellison:
Entropy Sources. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 421-423 - [r3]Carl M. Ellison:
SPKI. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1243-1245 - 2010
- [e1]Ken Klingenstein, Carl M. Ellison:
Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010. ACM 2010, ISBN 978-1-60558-895-7 [contents] - [r2]Carl M. Ellison:
Public Key Infrastructure. Handbook of Financial Cryptography and Security 2010: 455-493
2000 – 2009
- 2007
- [i3]Carl M. Ellison:
Ceremony Design and Analysis. IACR Cryptol. ePrint Arch. 2007: 399 (2007) - 2005
- [r1]Carl M. Ellison:
SPKI/SDSI. Encyclopedia of Cryptography and Security 2005 - 2003
- [j8]Carl M. Ellison, Steve Dohrmann:
Public-key support for group collaboration. ACM Trans. Inf. Syst. Secur. 6(4): 547-565 (2003) - 2001
- [j7]Dwaine E. Clarke
, Jean-Emile Elien, Carl M. Ellison, Matt Fredette, Alexander Morcos, Ronald L. Rivest:
Certificate Chain Discovery in SPKI/SDSI. J. Comput. Secur. 9(4): 285-322 (2001) - 2000
- [j6]Carl M. Ellison, Bruce Schneier:
Risks of PKI: Secure Email. Commun. ACM 43(1): 160 (2000) - [j5]Carl M. Ellison, Bruce Schneier:
Risks of PKI: E-Commerce. Commun. ACM 43(2): 152 (2000) - [j4]Carl M. Ellison, Chris Hall, Randy Milbert, Bruce Schneier:
Protecting secret keys with personal entropy. Future Gener. Comput. Syst. 16(4): 311-318 (2000) - [c3]Carl M. Ellison:
Naming and certificates. CFP 2000: 213-217
1990 – 1999
- 1999
- [j3]Carl M. Ellison:
The nature of a useable PKI. Comput. Networks 31(8): 823-830 (1999) - [i2]Carl M. Ellison:
SPKI Requirements. RFC 2692: 1-14 (1999) - [i1]Carl M. Ellison, Bill Frantz, Butler W. Lampson, Ron Rivest, Brian Thomas, Tatu Ylönen:
SPKI Certificate Theory. RFC 2693: 1-43 (1999) - 1998
- [c2]Carl M. Ellison:
The Trust Shell Game (Position Paper). Security Protocols Workshop 1998: 36-40 - [c1]Carl M. Ellison:
The Trust Shell Game (Transcript of Discussion). Security Protocols Workshop 1998: 41-44 - 1996
- [j2]Stephen T. Walker, Steven B. Lipner, Carl M. Ellison, David M. Balenson
:
Commercial Key Recovery. Commun. ACM 39(3): 41-47 (1996)
1980 – 1989
- 1988
- [j1]Carl M. Ellison:
A solution of the Hebern Messages. Cryptologia 12(3): 144-158 (1988)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint