Paper Recommendation
1994 A Digital Watermark

2000 Automated Trust Negotiation

1995 Holding intruders Accountable on The internet

1996 Role-based Access Control Models

2003 Interworking Architecture Between 3GPP and WLAN Systems

2002 Certificate Chain Discovery in SPKI?SDSI

1987 ABYSS: ATrusted Architecture For Software Protection

1994 Kerberos: An Authentication Service For Computer Networks

1994 Access Control: Principle and Practice

2003 Random Key Predistribution Schemes For Sensor Networks

1998 The FERET Verification Testing Protocol For Face Recognition Algorithms

2004 An introduction To Biometric Recognition

2000 Secure Border Gateway Protocol (S-BGP)

1975 The Protection of information in Computer Systems

2000 Cryptanalysis of A Remote User Authentication Scheme Using Smart Cards

2004 Discovery of Policy Anomalies in Distributed Firewalls

2001 A Practically Implementable and Tractable Delegation Logic

1994 Authentication of Mobile Users

1993 Lattice-based Access Control Models

1996 Iris Recognition Technology