Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard H. Guski is active.

Publication


Featured researches published by Richard H. Guski.


Archive | 1995

Authentication system using one-time passwords

Richard H. Guski; Raymond Craig Larson; Stephen M. Matyas; Donald B. Johnson; Don Coppersmith


Archive | 1999

Public key infrastructure delegation

Richard H. Guski; Timothy J. Hahn


Archive | 2002

Authenticated identity translation within a multiple computing unit environment

Patrick S. Botz; John C. Dayka; Richard H. Guski; Timothy J. Hahn; Margaret K. LaBelle


Archive | 1996

Method and apparatus for controlling server access to a resource in a client/server system

Donald F. Ault; John C. Dayka; Eric Charles Finkelstein; Richard H. Guski


Archive | 1997

Method and apparatus for entity authentication and session key generation

Richard H. Guski; John C. Dayka; Harvey McGee; Bruce Robert Wells


Archive | 2003

Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets

Linda N. Betz; John C. Dayka; Walter B. Farrell; Richard H. Guski; Guenter Karjoth; Mark A. Nelson; Birgit Pfitzmann; Matthias Schunter; Michael Waidner


Archive | 2007

Method for mapping privacy policies to classification labels

Carolyn Brodie; Richard H. Guski; Clare-Marie Karat; John Karat; Peter K. Malkin


Archive | 2006

Authenticated identity propagation and translation within a multiple computing unit environment

Patrick S. Botz; John C. Dayka; Donna N. Dillenberger; Richard H. Guski; Timothy J. Hahn; Margaret K. LaBelle; Mark A. Nelson


Archive | 2000

Identity vectoring via chained mapping records

Richard H. Guski; Walter B. Farrell; James W. Sweeny; Thomas Joseph Szczygielski; John M. Thompson


Archive | 2007

CONFIGURING HOST SETTINGS TO SPECIFY AN ENCRYPTION SETTING AND A KEY LABEL REFERENCING A KEY ENCYRPTION KEY TO USE TO ENCRYPT AN ENCRYPTION KEY PROVIDED TO A STORAGE DRIVE TO USE TO ENCRYPT DATA FROM THE HOST

Erika Marianna Dawson; Richard H. Guski; Michael J. Kelly; Cecilia Carranza Lewis; Jon A. Lynds; Wayne Erwin Rhoten; Peter G. Sutton

Researchain Logo
Decentralizing Knowledge