Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Paul Barrett.
international cryptology conference | 1989
Paul Barrett; Raymund Eisele
It is becoming increasingly common for large, distributed systems to utilise personal computers (PC’s) for the purpose of user access, and hence the security arrangements for such an access point have become a focus of attention in systems security design. Generally speaking the functional requirements of a PC security sub-system are as follows:- (i) Identity verification of the user, for controlling access both to resources within the local PC workstation and to remote teleprocessing services on other machines. (ii) File encryption at the PC for secure storage. (iii) Message encryption and message authentication for secure communications. (iv) Digital signatures for proof of origin of communications and for data and software certification.
international cryptology conference | 1987
Paul Barrett
Archive | 1997
Raymund Eisele; Axel Burkart; Paul Barrett
Archive | 1991
Paul Barrett; Raymund Eisele
Archive | 1995
Paul Barrett; Raymund Eisele
Archive | 1999
Paul Barrett; Raymund Eisele
Archive | 1992
Raymund Eisele; Paul Barrett
Archive | 2000
Raymund Eisele; Axel Burkart; Paul Barrett; Andrew Ryan; Peter Holy; Shaun Tantony
Archive | 1999
Raymund Eisele; Axel Burkart; Paul Barrett; Andrew Ryan; Peter Holy; Shaun Tantony
Archive | 1999
Paul Barrett; Andrew Ryan