An M3 public-key encryption scheme
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Key distribution protocol for digital mobile communication systems
CRYPTO '89 Proceedings on Advances in cryptology
Communications of the ACM
A cubic RSA code equivalent to factorization
Journal of Cryptology
Subliminal communication is easy using the DSA
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Contemporary Cryptology: The Science of Information Integrity
Contemporary Cryptology: The Science of Information Integrity
Using CSP to Detect Errors in the TMN Protocol
IEEE Transactions on Software Engineering
Using information security as a response to competitor analysis systems
Communications of the ACM
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Simmons' protocol is not free of subliminal channels
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Provable security for communication on the internet
ICCC '02 Proceedings of the 15th international conference on Computer communication
Journal of Computer Security - IFIP 2000
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
A java beans component architecture for cryptographic protocols
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Symbolic protocol analysis for monoidal equational theories
Information and Computation
Journal of Systems Architecture: the EUROMICRO Journal
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Cryptographic protocol analysis of AN.ON
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Information Systems and e-Business Management
The economic impact of cyber terrorism
The Journal of Strategic Information Systems
Hi-index | 48.23 |