Communications of the ACM
Using information security as a response to competitor analysis systems
Communications of the ACM
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Practical Key Recovery Schemes
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically)
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation
Proceedings of the 8th IMA International Conference on Cryptography and Coding
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Equitability in Retroactive Data Confiscation versus Proactive Key Escrow
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
On Solutions to the Key Escrow Problem
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Journal of Computer Security - IFIP 2000
Electronic Commerce Research
Authenticity and availability in PIPE networks
Future Generation Computer Systems - Special issue: P2P computing and interaction with grids
Securing distributed storage: challenges, techniques, and systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Security automation considered harmful?
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Self-encryption scheme for data security in mobile devices
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Proceedings of the 13th international conference on Security protocols
Privacy-enhanced Key Recovery in mobile communication environments
The Journal of Supercomputing
Did IT consulting firms gain when their clients were breached?
Computers in Human Behavior
SP'04 Proceedings of the 12th international conference on Security Protocols
Information Systems and e-Business Management
Proceedings of the 18th ACM symposium on Access control models and technologies
The economic impact of cyber terrorism
The Journal of Strategic Information Systems
Recoverable encryption through a noised secret over a large cloud
Transactions on Large-Scale Data- and Knowledge-centered systems IX
Hi-index | 48.25 |