| 2003 |
8 | | Barbara Fox,
Brian A. LaMacchia:
Encouraging recognition of fair uses in DRM systems.
Commun. ACM 46(4): 61-63 (2003) |
| 2000 |
7 | | Barbara Fox,
Brian A. LaMacchia:
Panel: Public Key Infrastructure: PKIX, Signed XML or Something Else?
Financial Cryptography 2000: 327-331 |
| 1999 |
6 | | Barbara Fox,
Brian A. LaMacchia:
Online Certificate Status Checking in Financial Transactions: The Case for Re-issuance.
Financial Cryptography 1999: 104-117 |
| 1998 |
5 | | Barbara Fox,
Brian A. LaMacchia:
Certificate Recocation: Mechanics and Meaning.
Financial Cryptography 1998: 158-164 |
4 | | Barbara Fox,
Brian A. LaMacchia:
"Cooperative Security": A Model for the New Enterprise.
WETICE 1998: 314-319 |
| 1997 |
3 | | Barbara Fox,
Brian Beckman,
Daniel R. Simon:
GUMP: Grand Unified Meta-Protocols Recipes for Simple, Standards-Based Financial Cryptography.
Financial Cryptography 1997: 375-394 |
2 | | Marvin Schaefer,
Sylvan Pinsky,
Drew Dean,
Li Gong,
Jim Roskind,
Barbara Fox:
Ensuring Assurance in Mobile Computing.
IEEE Symposium on Security and Privacy 1997: 114-118 |
| 1987 |
1 | | Paul Smolensky,
Brigham Bell,
Barbara Fox,
Roger King,
Clayton H. Lewis:
Constraint-Based Hypertext for Argumentation.
Hypertext 1987: 215-245 |