Implementing fault-tolerant services using the state machine approach: a tutorial
ACM Computing Surveys (CSUR)
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A faster deterministic maximum flow algorithm
SODA '92 Proceedings of the third annual ACM-SIAM symposium on Discrete algorithms
Internet Privacy Enhanced Mail
Communications of the ACM - Special issue on internetworking
Trust-based navigation in distributed systems
Computing Systems
The official PGP user's guide
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Associating Metrics to Certification Paths
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
On Inter-RealmAuthentication in Large Distributed Systems
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Tolerating penetrations and insider attacks by requiring independent corroboration
Proceedings of the 1998 workshop on New security paradigms
Which PKI (public key infrastructure) is the right one? (panel session)
Proceedings of the 7th ACM conference on Computer and communications security
Trust: benefits, models, and mechanisms
Secure Internet programming
COCA: A secure distributed online certification authority
ACM Transactions on Computer Systems (TOCS)
Relying Party Credentials Framework
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
On the Complexity of Public-Key Certificate Validation
ISC '01 Proceedings of the 4th International Conference on Information Security
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Relying Party Credentials Framework
Electronic Commerce Research
Is hierarchical public-key certification the next target for hackers?
Communications of the ACM - Interactive immersion in 3D graphics
Propagation Models for Trust and Distrust in Social Networks
Information Systems Frontiers
Message authentication by integrity with public corroboration
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Automating security configuration for the Grid
Scientific Programming - International Symposium of Parallel and Distributed Computing & International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Models For Dependable Computation with Multiple Inputs and Some Hardness Results
Fundamenta Informaticae
Hi-index | 0.00 |