Customized information extraction as a basis for resource discovery
ACM Transactions on Computer Systems (TOCS)
Securing the commercial Internet
Communications of the ACM
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Extended analogy: an alternative lecture method
SIGCSE '98 Proceedings of the twenty-ninth SIGCSE technical symposium on Computer science education
How to break fraud-detectable key recovery
ACM SIGOPS Operating Systems Review
Personal security agent: KQML-based PKI
AGENTS '98 Proceedings of the second international conference on Autonomous agents
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
A credibility-based model of computer system security
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
ACM-SE 37 Proceedings of the 37th annual Southeast regional conference (CD-ROM)
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Obstacles to freedom and privacy by design
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Efficient fault-tolerant certificate revocation
Proceedings of the 7th ACM conference on Computer and communications security
Which PKI (public key infrastructure) is the right one? (panel session)
Proceedings of the 7th ACM conference on Computer and communications security
Distributed access-rights management with delegation certificates
Secure Internet programming
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Secure password-based cipher suite for TLS
ACM Transactions on Information and System Security (TISSEC)
EW 7 Proceedings of the 7th workshop on ACM SIGOPS European workshop: Systems support for worldwide applications
Notions of reputation in multi-agents systems: a review
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Automated cross-organisational trust establishment on extranets
ITVE '01 Proceedings of the workshop on Information technology for virtual enterprises
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Towards flexible credential verification in mobile ad-hoc networks
Proceedings of the second ACM international workshop on Principles of mobile computing
Trusted third parties in electronic commerce
BT Technology Journal
Cryptography, trusted third parties and escrow
BT Technology Journal
Disseminating Trust Information in Wearable Communities
Personal and Ubiquitous Computing
IEEE Internet Computing
Broadcast Encryption's Bright Future
Computer
IEEE Software
The Impact of Confidentiality on Quality of Service in Heterogeneous Voice over IP Networks
MMNS '01 Proceedings of the 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services: Management of Multimedia on the Internet
Modelling Trust Structures for Public Key Infrastructures
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Relying Party Credentials Framework
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces
FIDJI '01 Revised Papers from the International Workshop on Scientific Engineering for Distributed Java Applications
ConChord: Cooperative SDSI Certificate Storage and Name Resolution
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Community Formation via a Distributed, Privacy-Protecting Matchmaking System
Community Computing and Support Systems, Social Interaction in Networked Communities [the book is based on the Kyoto Meeting on Social Interaction and Communityware, held in Kyoto, Japan, in June 1998]
Distributed Trust in Open Multi-agent Systems
Proceedings of the workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conference: Trust in Cyber-societies, Integrating the Human and Artificial Perspectives
Defective Sign & Encrypt in S/MIME, PKCS#7, MOSS, PEM, PGP, and XML
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Trust Management and Whether to Delegate
Revised Papers from the 9th International Workshop on Security Protocols
Towards a Survivable Security Architecture for Ad-Hoc Networks
Revised Papers from the 9th International Workshop on Security Protocols
Design of a VPN Software Solution Integrating TCP and UDP Services
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Informatics - 10 Years Back. 10 Years Ahead.
Model and Implementation of a Secure SW-Development Process for Mission Critical Software
SAFECOMP '98 Proceedings of the 17th International Conference on Computer Safety, Reliability and Security
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Information Agents for Mobile and Embedded Devices
CIA '01 Proceedings of the 5th International Workshop on Cooperative Information Agents V
Cryptanalytic Attacks on Pseudorandom Number Generators
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Implementation of Virtual Private Networks at the Transport Layer
ISW '99 Proceedings of the Second International Workshop on Information Security
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
ISC '02 Proceedings of the 5th International Conference on Information Security
Security of Electronic Business Applications - Structure and Quantification
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Explaining cryptographic systems
Computers & Education
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A secure infrastructure for service discovery and access in pervasive computing
Mobile Networks and Applications - Security in mobile computing environments
Secure traceroute to detect faulty or malicious routing
ACM SIGCOMM Computer Communication Review
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Distance education and on-line universities
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Small worlds in security systems: an analysis of the PGP certificate graph
Proceedings of the 2002 workshop on New security paradigms
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Technologies for Trust in Electronic Commerce
Electronic Commerce Research
Relying Party Credentials Framework
Electronic Commerce Research
Towards Pseudonymous e-Commerce
Electronic Commerce Research
Trust enhanced ubiquitous payment without too much privacy loss
Proceedings of the 2004 ACM symposium on Applied computing
Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
A certificate revocation scheme for wireless ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key Management for Encrypted Data Storage in Distributed Systems
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Off-the-record communication, or, why not to use PGP
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
filetsf: A File Transfer System Based on lpr/lpd
LISA '95 Proceedings of the 9th USENIX conference on System administration
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ssmail: Opportunistic Encryption in sendmail
LISA '99 Proceedings of the 13th USENIX conference on System administration
Automating Request-based Software Distribution
LISA '00 Proceedings of the 14th USENIX conference on System administration
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Simulating the establishment of trust infrastructures in multi-agent systems
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
SELS: a secure e-mail list service
Proceedings of the 2005 ACM symposium on Applied computing
Encyclopedia of Computer Science
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Semantic constraints for trust transitivity
APCCM '05 Proceedings of the 2nd Asia-Pacific conference on Conceptual modelling - Volume 43
Secure Spread: An Integrated Architecture for Secure Group Communication
IEEE Transactions on Dependable and Secure Computing
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Secure off-the-record messaging
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Authentification par la méfiance dans les systèmes pervasifs
UbiMob '05 Proceedings of the 2nd French-speaking conference on Mobility and ubiquity computing
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Security in WebCom: addressing naming issues for a web services architecture
SWS '04 Proceedings of the 2004 workshop on Secure web service
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Resolving islands of security problem for DNSSEC
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Certified reputation: how an agent can trust a stranger
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs)
Proceedings of the 43rd annual Southeast regional conference - Volume 2
On countering online dictionary attacks with login histories and humans-in-the-loop
ACM Transactions on Information and System Security (TISSEC)
Forward-secure signatures with untrusted update
Proceedings of the 13th ACM conference on Computer and communications security
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Socio-technical defense against voice spamming
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A heterogeneous-network aided public-key management scheme for mobile ad hoc networks
International Journal of Network Management
Usability evaluation of multi-modal biometric verification systems
Interacting with Computers
A survey of trust and reputation systems for online service provision
Decision Support Systems
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
Computer Communications
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
A chosen ciphertext attack against several e-mail encryption protocols
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Digital-ticket-controlled digital ticket circulation
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
On interdomain routing security and pretty secure BGP (psBGP)
ACM Transactions on Information and System Security (TISSEC)
Secure WWW transactions using standard HTTP and Java applets
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Kerberos plus RSA for world wide web security
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Information Sciences: an International Journal
An end-middle-end approach to connection establishment
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Performance evaluation and comparison of different ad hoc routing protocols
Computer Communications
Trust-based security for wireless ad hoc and sensor networks
Computer Communications
Supporting trust building in distributed groups by appropriate security technology
Proceedings of the 2007 international ACM conference on Supporting group work
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
RepuScore: collaborative reputation management framework for email infrastructure
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
A pull-based e-mail architecture
Proceedings of the 2008 ACM symposium on Applied computing
Proceedings of the 1st international conference on Autonomic computing and communication systems
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A reputation system for electronic negotiations
Computer Standards & Interfaces
Ostra: leveraging trust to thwart unwanted communication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Security and identification indicators for browsers against spoofing and phishing attacks
ACM Transactions on Internet Technology (TOIT)
NOYB: privacy in online social networks
Proceedings of the first workshop on Online social networks
A scalable authentication model based on public keys
Journal of Network and Computer Applications
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Embodied conversational agents for voice-biometric interfaces
ICMI '08 Proceedings of the 10th international conference on Multimodal interfaces
The importance of location on trust in mobile networks
WSEAS TRANSACTIONS on COMMUNICATIONS
A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay Networks
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Towards a precise semantics for authenticity and trust
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Using web service enhancements to bridge business trust relationships
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Using audio in secure device pairing
International Journal of Security and Networks
Waterhouse: enabling secure e-mail with social networking
CHI '09 Extended Abstracts on Human Factors in Computing Systems
International Journal of Ad Hoc and Ubiquitous Computing
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
An Evolutionary Trust and Distrust Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Survivable keying for wireless ad hoc networks
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Data Privacy in Tuple Space Based Mobile Agent Systems
Electronic Notes in Theoretical Computer Science (ENTCS)
Distributed instrusion prevention in active and extensible networks
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Evaluating reputation in multi-agents systems
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
T2D: a peer to peer trust management system based on disposition to trust
Proceedings of the 2010 ACM Symposium on Applied Computing
Context adapted certificate using morph template signature for pervasive environments
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
An efficient certificate authority for ad hoc networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Authenticating DSR using a novel multisignature scheme based on cubic LFSR sequences
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Foundations of security analysis and design IV
Proceedings of the 13th international conference on Security protocols
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Detecting trustworthy real-time communications using a web-of-trust
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
FaceTrust: assessing the credibility of online personas via social networks
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Foundations and Trends in Information Retrieval
Bazaar: strengthening user reputations in online marketplaces
Proceedings of the 8th USENIX conference on Networked systems design and implementation
TrustRings in mobile wireless network settings
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Information seeking: convergence of search, recommendations, and advertising
Communications of the ACM
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Heterogeneous network-based trust analysis: a survey
ACM SIGKDD Explorations Newsletter
Scramble! your social network data
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
SOMA: self-organised mesh authentication
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
On the price of security in large-scale wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Trust metrics for the SPKI/SDSI authorisation framework
ATVA'11 Proceedings of the 9th international conference on Automated technology for verification and analysis
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
TIDE: measuring and evaluating trustworthiness and credibility of enterprises in digital ecosystem
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
A distributed mechanism for secure collaboration in digital ecosystems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Twitter in disaster mode: security architecture
Proceedings of the Special Workshop on Internet and Disasters
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
From proxy encryption primitives to a deployable secure-mailing-list solution
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
The design, generation, and utilisation of a semantically rich personalised model of trust
iTrust'06 Proceedings of the 4th international conference on Trust Management
A smart card solution for access control and trust management for nomadic users
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Stabilizing certificate dispersal
SSS'05 Proceedings of the 7th international conference on Self-Stabilizing Systems
Views, reactions and impact of digitally-signed mail in e-commerce
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
ID-Based access control and authority delegations
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Towards enhancing trust on chinese e-commerce
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
An algebra for trust dilution and trust fusion
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Controlling spam by secure internet content selection
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
On tolerant cryptographic constructions
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Related-mode attacks on block cipher modes of operation
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
TrustAC: trust-based access control for pervasive devices
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
iTrust'05 Proceedings of the Third international conference on Trust Management
On the importance of composability of ad hoc mobile middleware and trust management
ISAS'05 Proceedings of the Second international conference on Service Availability
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
Journal of Network and Computer Applications
Off-line keyword guessing attacks on recent keyword search schemes over encrypted data
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Network access control for mobile ad-hoc networks
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Privacy preserving web-based email
ICISS'06 Proceedings of the Second international conference on Information Systems Security
An approach to trust management challenges for critical infrastructures
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Collaborative service evaluation with the TwoHop trust framework
Security and Communication Networks
MILC: A secure and privacy-preserving mobile instant locator with chatting
Information Systems Frontiers
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business
X316 security toolbox for new generation of certificate
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Countering statistical disclosure with receiver-bound cover traffic
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Linguistic properties of multi-word passphrases
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments
ACM Transactions on Internet Technology (TOIT)
SybilCast: broadcast on the open airwaves (extended abstract)
Proceedings of the twenty-fifth annual ACM symposium on Parallelism in algorithms and architectures
Cryptagram: photo privacy for online social media
Proceedings of the first ACM conference on Online social networks
Safeguarding ad hoc networks with a self-organized membership control system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.03 |