Communications of the ACM
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Authentication Systems for Secure Networks
Authentication Systems for Secure Networks
A "bump in the stack" encryptor for MS-DOS systems
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
Communications of the ACM
Design and implementation of IBIDS—an Internet based integrated design system
ACM-SE 37 Proceedings of the 37th annual Southeast regional conference (CD-ROM)
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
TCP/IP and security software applications
Proceedings of the seventh annual consortium for computing in small colleges central plains conference on The journal of computing in small colleges
Distributed Java Applets for Project Management on the Web
IEEE Internet Computing
Encrypted Message Authentication by Firewalls
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Security of Electronic Business Applications - Structure and Quantification
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Cascade of Distributed and Cooperating Firewalls in a Secure Data Network
IEEE Transactions on Knowledge and Data Engineering
Toward an integrative model of application-software security
Practicing software engineering in the 21st century
Digital signature: use and modification to achieve success in next generational e-business processes
Information and Management
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Hybrid Intrusion Forecasting Framework for Early Warning System
IEICE - Transactions on Information and Systems
A formal logic approach to firewall packet filtering analysis and generation
Artificial Intelligence Review
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Mobile-agent mediated place oriented communication
CIA'99 Proceedings of the 3rd international conference on Cooperative information agents III
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Hi-index | 48.23 |