The design, implementation and operation of an email pseudonym server
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
ACM-SE 37 Proceedings of the 37th annual Southeast regional conference (CD-ROM)
Compactly encoding unstructured inputs with differential compression
Journal of the ACM (JACM)
High Performance DES Encryption in Virtex(tm) FPGAs Using Jbits(tm)
FCCM '00 Proceedings of the 2000 IEEE Symposium on Field-Programmable Custom Computing Machines
Distance education and on-line universities
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
Network Access and Data Security Design for Telemedicine Applications
ISCC '97 Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
Decentralized user authentication in a global file system
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Protection in flexible operating system architectures
ACM SIGOPS Operating Systems Review
Encyclopedia of Computer Science
Strong Security for Network-Attached Storage
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
The maturity of open systems for B2B
ACM SIGecom Exchanges
Software generation of practically strong random numbers
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A trust-based secure service discovery (TSSD) model for pervasive computing
Computer Communications
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Evidence-based trust: A mathematical model geared for multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A location based security framework for authenticating mobile phones
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing
Strong security for network-attached storage
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Enforcing trust in pervasive computing with trusted computing technology
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Hi-index | 0.00 |