Communications of the ACM
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Cipher Instruction Search Attack on the Bus-Encryption Security Microcontroller DS5002FP
IEEE Transactions on Computers
The role of trust management in distributed systems security
Secure Internet programming
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Optical Time-Domain Eavesdropping Risks of CRT Displays
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Rights Amplification in Master-Keyed Mechanical Locks
IEEE Security and Privacy
Chaining layered integrity checks
Chaining layered integrity checks
Strongman: a scalable solution to trust management in networks
Strongman: a scalable solution to trust management in networks
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Experience with the keynote trust management system: applications and future directions
iTrust'03 Proceedings of the 1st international conference on Trust management
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
The dining freemasons: security protocols for secret societies
Proceedings of the 13th international conference on Security protocols
The dining freemasons: security protocols for secret societies
Proceedings of the 13th international conference on Security protocols
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Hi-index | 0.00 |
Computer and network security researchers usually focus on the security of computers and networks. Although it might seem as if there is more than enough insecurity here to keep all of us fully occupied for the foreseeable future, this narrow view of our domain may actually be contributing to the very problems that we are trying to solve. We miss important insights from, and opportunities to make contributions to, a larger world that has been grappling with security since long before the computer was invented.