How to break fraud-detectable key recovery
ACM SIGOPS Operating Systems Review
Emperor: cheap legal secure cryptography for the Web
Proceedings of the 1999 ACM symposium on Applied computing
Toward a secure system engineering methodolgy
Proceedings of the 1998 workshop on New security paradigms
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Cryptographic Design Vulnerabilities
Computer
Practical Solutions to Key Recovery Based on PKI in IP Security
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Marking: A Privacy Protecting Approach Against Blackmailing
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Freezing more than bits: chilling effects of the OLPC XO security model
UPSEC'08 Proceedings of the 1st Conference on Usability, Psychology, and Security
Confused Johnny: when automatic encryption leads to confusion and mistakes
Proceedings of the Ninth Symposium on Usable Privacy and Security
Recoverable encryption through a noised secret over a large cloud
Transactions on Large-Scale Data- and Knowledge-centered systems IX
Hi-index | 0.00 |