ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
Reducing risks from poorly chosen keys
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Message authentication with one-way hash functions
IEEE INFOCOM '92 Proceedings of the eleventh annual joint conference of the IEEE computer and communications societies on One world through communications (Vol. 3)
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM - Special 25th Anniversary Issue
Timestamps in key distribution protocols
Communications of the ACM
Password security: a case history
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
KryptoKnight Authentication and Key Distribution System
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
A general purpose proxy filtering mechanism applied to the mobile environment
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Authentication services for computer networks and electronic messaging systems
ACM SIGOPS Operating Systems Review
Secure group communications using key graphs
Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication
A security architecture for the Internet protocol
IBM Systems Journal
Secure group communications using key graphs
IEEE/ACM Transactions on Networking (TON)
Security in Wireless Communication
Wireless Personal Communications: An International Journal
Multicast group membership management
IEEE/ACM Transactions on Networking (TON)
IAuth: An authentication system for Internet applications
COMPSAC '97 Proceedings of the 21st International Computer Software and Applications Conference
Maintaining Security in the Presence of Transient Faults
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Lessons Learned in Implementing and Deploying Crypto Software
Proceedings of the 11th USENIX Security Symposium
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
An architecture for the internet key exchange protocol
IBM Systems Journal - End-to-end security
Design and implementation of modular key management protocol and IP secure tunnel on AIX
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
A round- and computation-efficient three-party authenticated key exchange protocol
Journal of Systems and Software
Formal apparatus for measurement of lightweight protocols
Computer Standards & Interfaces
Towards a trustworthy short-range mobile payment system
International Journal of Information Technology and Management
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Secure three-party key distribution protocol for fast network access in EAP-based wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Provable Billing Protocol on the Current UMTS
Wireless Personal Communications: An International Journal
A kerberized architecture for fast re-authentication in heterogeneous wireless networks
Mobile Networks and Applications
Crypto topics and applications I
Algorithms and theory of computation handbook
Secure collaborative cloud design for global USN services
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume PartI
Design of key establishment protocol using one-way functions to avert insider-replay attack
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Applying authorization to intranets: architectures, issues and APIs
Computer Communications
Hi-index | 0.00 |