CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A quantitative analysis of cache policies for scalable network file systems
SIGMETRICS '94 Proceedings of the 1994 ACM SIGMETRICS conference on Measurement and modeling of computer systems
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Strong loss tolerance of electronic coin systems
ACM Transactions on Computer Systems (TOCS)
A Secure Agent-based Framework for Internet Trading in Mobile Computing Environments
Distributed and Parallel Databases - Security of data and transaction processing
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
A Survey of Encryption Standards
IEEE Micro
Cryptographic Protocols Based on Discrete Logarithms in Real-quadratic Orders
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An Architecture for Secure Generation and Verification of Electronic Coupons
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
Authentication and Billing Protocols for the Integration of WLAN and 3G Networks
Wireless Personal Communications: An International Journal
A new multi-stage secret sharing scheme using one-way function
ACM SIGOPS Operating Systems Review
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
An optimized protocol for mobile network authentication and security
ACM SIGMOBILE Mobile Computing and Communications Review
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
Advanced method for cryptographic protocol verification
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
An implementation of the general number field sieve to compute discrete logarithms mod p
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A correlation based detection system for keys reuse in SSH/SSL
AMERICAN-MATH'11/CEA'11 Proceedings of the 2011 American conference on applied mathematics and the 5th WSEAS international conference on Computer engineering and applications
An ID-based multi-signer universal designated multi-verifier signature scheme
Information and Computation
Capture resilient elgamal signature protocols
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Hi-index | 48.22 |