ACM Computing Surveys (CSUR)
Public-key cryptography and password protocols
ACM Transactions on Information and System Security (TISSEC)
CryptoManiac: a fast flexible architecture for secure communication
ISCA '01 Proceedings of the 28th annual international symposium on Computer architecture
The performance of public key-enabled kerberos authentication in mobile computing applications
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Software—Practice & Experience - Special issue: Mobile agent systems
QoS-Centric Stateful Resource Management in Information Systems
Information Systems Frontiers
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
On Group Communication Systems: Insight, a Primer, and a Snapshot
ICCS '01 Proceedings of the International Conference on Computational Sciences-Part I
Certificate Use for Supporting Merging and Splitting of Computational Environments
HPCN Europe 2001 Proceedings of the 9th International Conference on High-Performance Computing and Networking
Java Based E-Commerce middleware
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Hash to the Rescue: Space Minimization for PKI Directories
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
The Untrusted Computer Problem and Camera-Based Authentication
Pervasive '02 Proceedings of the First International Conference on Pervasive Computing
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Persistent Authenticated Dictionaries and Their Applications
ISC '01 Proceedings of the 4th International Conference on Information Security
An Efficient Dynamic and Distributed Cryptographic Accumulator
ISC '02 Proceedings of the 5th International Conference on Information Security
Authentication for Mobile Agents
Mobile Agents and Security
Security Issues in Mobile Code Systems
Mobile Agents and Security
D'Agents: Security in a Multiple-Language, Mobile-Agent System
Mobile Agents and Security
Managing e-business: security issues and solutions
Managing web usage in the workplace
Humans in the Loop: Human-Computer Interaction and Security
IEEE Security and Privacy
CITC4 '03 Proceedings of the 4th conference on Information technology curriculum
Active security management based on secure zone cooperation
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Merging paradigms of survivability and security: stochastic faults and designed faults
Proceedings of the 2003 workshop on New security paradigms
Admission control in Peer-to-Peer: design and performance evaluation
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Total recall: are privacy changes inevitable?
Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences
Forensic course development: one year later
CITC5 '04 Proceedings of the 5th conference on Information technology education
Single Sign-On and the System Administrator
LISA '98 Proceedings of the 12th USENIX conference on System administration
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Encyclopedia of Computer Science
Security as a safety issue in rail communications
SCS '03 Proceedings of the 8th Australian workshop on Safety critical systems and software - Volume 33
Computational concepts in IT: a new approach to IT mathematics
Proceedings of the 6th conference on Information technology education
Conflict detection and resolution in two-dimensional prefix router tables
IEEE/ACM Transactions on Networking (TON)
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Modelling the relative strength of security protocols
Proceedings of the 2nd ACM workshop on Quality of protection
Evading network anomaly detection systems: formal reasoning and practical techniques
Proceedings of the 13th ACM conference on Computer and communications security
Information security and computer systems: an integrated approach
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
New techniques for ensuring the long term integrity of digital archives
dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
PDM: a new strong password-based protocol
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Using mobile code interfaces to control ubiquitous embedded systems
WOES'99 Proceedings of the Workshop on Embedded Systems on Workshop on Embedded Systems
A protocol for secure transactions
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
PDM: a new strong password-based protocol
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
Human-in-the-loop: rethinking security in mobile and pervasive systems
CHI '08 Extended Abstracts on Human Factors in Computing Systems
A platform independent approach for mobile agents to monitor network vulnerabilities
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Proceedings of the 7th symposium on Identity and trust on the Internet
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
Distributed agent architecture for packet filtering & monitoring in networked computers
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
A framework for reasoning about the human in the loop
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Entity Based Message Authentication System
KES-AMSTA '07 Proceedings of the 1st KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Improved client authentication using session authentication in the internet
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Design of secure monitor in the secure zone cooperation
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
On the cost of persistence and authentication in skip lists
WEA'07 Proceedings of the 6th international conference on Experimental algorithms
Information Sciences: an International Journal
Security agent model using interactive authentication database
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Client authentication model using duplicated authentication server systems
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A transparent end-to-end security solution
ICISS'05 Proceedings of the First international conference on Information Systems Security
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense
Journal of Computer Security
Hi-index | 0.00 |