Authentication in the Taos operating system
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Modelling audit security for Smart-Card payment schemes with UML-SEC
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
An Identity-Based Signature Scheme with Bounded Life-Span
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Smartcards: Hot to Put them to Use in a User-Centric System
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
Deciding knowledge properties of security protocols
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
A (restricted) quantifier elimination for security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
Providing authentication to messages signed with a smart card in hostile environments
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Rapid Trust Establishment for Pervasive Personal Computing
IEEE Pervasive Computing
A Demonstrative Ad Hoc Attestation System
ISC '08 Proceedings of the 11th international conference on Information Security
Preventing identity theft with electronic identity cards and the trusted platform module
Proceedings of the Second European Workshop on System Security
Usability of display-equipped RFID tags for security purposes
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
A new mobile payment system with formal verification
International Journal of Internet Technology and Secured Transactions
Remotely keyed cryptographics secure remote display access using (mostly) untrusted hardware
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.00 |