Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
ACM SIGOPS Operating Systems Review
Networks without user observability
Computers and Security
CRYPTO '88 Proceedings on Advances in cryptology
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Modeling Cryptographic Protocols and Their Collusion Analysis
Proceedings of the First International Workshop on Information Hiding
MIXes in Mobile Communication Systems: Location Management with Privacy
Proceedings of the First International Workshop on Information Hiding
The use of communications networks to increase personal privacy
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
An Algorithm to Compute Collusion Paths
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
ACM SIGecom Exchanges
Secure and efficient group key management with shared key derivation
Computer Standards & Interfaces
Distributed architectures for electronic cash schemes: a survey
International Journal of Parallel, Emergent and Distributed Systems
Privacy-preserving, taxable bank accounts
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
A game-theoretic approach to credit card fraud detection
ICISS'05 Proceedings of the First international conference on Information Systems Security
Scalable secure one-to-many group communication using dual encryption
Computer Communications
Hi-index | 0.00 |