The infeasibility of experimental quantification of life-critical software reliability
SIGSOFT '91 Proceedings of the conference on Software for citical systems
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
The Mythical Man-Month: Essays on Softw
The Mythical Man-Month: Essays on Softw
Perspectives in Information Technology Security
Proceedings of the IFIP 12th World Computer Congress on Education and Society - Information Processing '92 - Volume 2 - Volume 2
UEPS - A Second Generation Electronic Wallet
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Towards Security in an Open Systems Federation
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Money in electronic commerce: digital cash, electronic fund transfer, and Ecash
Communications of the ACM
On the Reliability of Electronic Payment Systems
IEEE Transactions on Software Engineering
Strong loss tolerance of electronic coin systems
ACM Transactions on Computer Systems (TOCS)
Proceedings of the 4th ACM conference on Computer and communications security
How to Build Robust Shared Control Systems
Designs, Codes and Cryptography
On the functional relation between security and dependability impairments
Proceedings of the 1999 workshop on New security paradigms
Five dimensions of information security awareness
ACM SIGCAS Computers and Society
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Certificate based PKI and B2B E-commerce: suitable match or not?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Modelling audit security for Smart-Card payment schemes with UML-SEC
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
A paradigmatic analysis of conventional approaches for developing and managing secure IS
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Cryptographic Design Vulnerabilities
Computer
Photographic Authentication through Untrusted Terminals
IEEE Pervasive Computing
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Lessons Learned in Implementing and Deploying Crypto Software
Proceedings of the 11th USENIX Security Symposium
The Correctness of Crypto Transaction Sets (Discussion)
Revised Papers from the 8th International Workshop on Security Protocols
Encapsulating Rules of Prudent Security Engineering
Revised Papers from the 9th International Workshop on Security Protocols
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)
Revised Papers from the 9th International Workshop on Security Protocols
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
The Personal Server: Changing the Way We Think about Ubiquitous Computing
UbiComp '02 Proceedings of the 4th international conference on Ubiquitous Computing
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
CHI '03 Extended Abstracts on Human Factors in Computing Systems
An Investigation into the Security of Self-Timed Circuits
ASYNC '03 Proceedings of the 9th International Symposium on Asynchronous Circuits and Systems
Lightweight Bytecode Verification
Journal of Automated Reasoning
Computer Security in the Real World
Computer
Soft Tamper-Proofing via Program Integrity Verification in Wireless Sensor Networks
IEEE Transactions on Mobile Computing
Trust but verify: accountability for network services
Proceedings of the 11th workshop on ACM SIGOPS European workshop
An analysis of the traditional IS security approaches: implications for research and practice
European Journal of Information Systems
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Déjà Vu: a user study using images for authentication
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Authenticating secure tokens using slow memory access
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Breaking up is hard to do: modeling security threats for smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
A resilient access control scheme for secure electronic transactions
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Enclaves: enabling secure collaboration over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Strong accountability for network storage
ACM Transactions on Storage (TOS)
Computer-aided Support for Secure Tropos
Automated Software Engineering
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
IEICE - Transactions on Information and Systems
S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
Electronic Notes in Theoretical Computer Science (ENTCS)
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Computer Communications
A Petri net-based model for verification of obligations and accountability in cooperative systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Particle swarm optimization approach for information security investment decision
CA '07 Proceedings of the Ninth IASTED International Conference on Control and Applications
Blunting Differential Attacks on PIN Processing APIs
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Extending Security Protocol Analysis: New Challenges
Electronic Notes in Theoretical Computer Science (ENTCS)
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Information security economics - and beyond
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Position statement in RFID S&P panel: RFID and the middleman
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Dynamic virtual credit card numbers
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
The unbearable lightness of PIN cracking
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
A graphical PIN authentication mechanism with applications to smart cards and low-cost devices
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Live forensics framework for wireless sensor nodes using sandboxing
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
The role of accountability in dependable distributed systems
HotDep'05 Proceedings of the First conference on Hot topics in system dependability
Breaking undercover: exploiting design flaws and nonuniform human behavior
Proceedings of the Seventh Symposium on Usable Privacy and Security
Cryptographic key reliable lifetimes: bounding the risk of key exposure in the presence of faults
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
ECRYPT: the cryptographic research challenges for the next decade
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Classifying public key certificates
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
Computer Communications
Security policy conceptual modeling and formalization for networked information systems
Computer Communications
Composable reliability for asynchronous systems
USENIX ATC'12 Proceedings of the 2012 USENIX conference on Annual Technical Conference
Security economics: a personal perspective
Proceedings of the 28th Annual Computer Security Applications Conference
The burden of proof and the optimal security investment of firms in ubiquitous computing
Personal and Ubiquitous Computing
Hi-index | 48.24 |