CERT incident response and the Internet
Communications of the ACM
Communications of the ACM
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Issues 94—public key—trials and tribulations
ACM SIGSAC Review - Special issue: Issues 94 workshop on public key cryptography
Distributing trust with the Rampart toolkit
Communications of the ACM
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Issues '95—electronic commerce
ACM SIGSAC Review - Soecial issues on Issues 95: electronic commerce
Internet security: firewalls and beyond
Communications of the ACM
Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Authentication services for computer networks and electronic messaging systems
ACM SIGOPS Operating Systems Review
Multicast security and its extension to a mobile environment
Wireless Networks
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
Computer
A Response to ''Can We Eliminate Certificate Revocation Lists?''
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Distance education and on-line universities
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Tradeoffs in certificate revocation schemes
ACM SIGCOMM Computer Communication Review
Use of nested certificates for efficient, dynamic, and trust preserving public key infrastructure
ACM Transactions on Information and System Security (TISSEC)
Design and implementation of secure e-mail system using elliptic curve cryptosystem
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
AnZenMail: a secure and certified e-mail system
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Privacy preserving web-based email
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Analyzing Internet e-mail date-spoofing
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.07 |