Network security via private-key certificates
ACM SIGOPS Operating Systems Review
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Cryptography and secure channels
Distributed systems (2nd Ed.)
IEEE Transactions on Software Engineering
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Java Security: Present and Near Future
IEEE Micro
Expert Systems as Knowledge Servers
IEEE Expert: Intelligent Systems and Their Applications
Broadening the Scope of Fault Tolerance within Secure Services
Revised Papers from the 8th International Workshop on Security Protocols
Thwarting Timing Attacks Using ATM Networks
Revised Papers from the 9th International Workshop on Security Protocols
Efficient authenticated key agreement protocols resistant to a denial-of-service attack
International Journal of Network Management
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
On the implementation of security policies with adaptative encryption
Computer Communications
Using adaptative encryption for ubiquitous environments
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Toward a broader view of security protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
Toward a broader view of security protocols (transcript of discussion)
SP'04 Proceedings of the 12th international conference on Security Protocols
Public-key cryptography and availability
SAFECOMP'05 Proceedings of the 24th international conference on Computer Safety, Reliability, and Security
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Jikzi - a new framework for security policy, trusted publishing and electronic commerce
Computer Communications
Hi-index | 48.22 |