Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
An architecture for easy Web page updating
Crossroads - Special issue on markup languages
SIGUCCS '99 Proceedings of the 27th annual ACM SIGUCCS conference on User services: Mile high expectations
Agent communication transfer protocol
AGENTS '00 Proceedings of the fourth international conference on Autonomous agents
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Implementation of fast RSA key generation on smart cards
Proceedings of the 2002 ACM symposium on Applied computing
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Taming access control security: extending capabilities using the views relationship
Software—Practice & Experience
Mental poker game based on a bit commitment scheme through network
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel computer architecture to prevent destruction by viruses
Journal of Computer Science and Technology
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
IEEE Transactions on Computers
Using Compatible Keys for Secure Multicasting in E-Commerce
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
An Access Control with handling Private Information
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Interference Analysis for Dependable Systems Using Refinement and Abstraction
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512
ISC '02 Proceedings of the 5th International Conference on Information Security
Managing e-business: security issues and solutions
Managing web usage in the workplace
Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation
Proceedings of the 13th ACM Great Lakes symposium on VLSI
Mobile Networks and Applications - Security in mobile computing environments
Breakthrough in privacy concerns and lawful access conflicts
Telematics and Informatics
An efficient key assignment scheme based on one-way hash function in a user hierarchy
Journal of Computer Science and Technology
Authentication of volume data using wavelet-based foveation
Proceedings of the sixth Eurographics workshop on Multimedia 2001
Secure internet access to medical data
Knowledge media in healthcare
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Cellular automata based authentication (CAA)
ICCC '02 Proceedings of the 15th international conference on Computer communication
One-way trap door functions based on the Boolean satisfiability problem
ICCC '02 Proceedings of the 15th international conference on Computer communication
Design, implementation and performance analysis of secure group communications
ICCC '02 Proceedings of the 15th international conference on Computer communication
Formal description of perfect security
ICCC '02 Proceedings of the 15th international conference on Computer communication
IsoWAN: A NASA Science and Engineering Information and Services Framework
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
A Secure Data Hiding Scheme for Two-Color Images
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Architectural Impact of Secure Socket Layer on Internet Servers
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
Web based image authentication using invisible Fragile watermark
VIP '01 Proceedings of the Pan-Sydney area workshop on Visual information processing - Volume 11
Modelling secure multiagent systems
AAMAS '03 Proceedings of the second international joint conference on Autonomous agents and multiagent systems
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Payment technologies for E-commerce
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Secret key distribution protocol using public key cryptography
Journal of Computing Sciences in Colleges
A methodology to provide and use interchangeable services
Proceedings of the 2003 ACM symposium on Applied computing
Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme
ACM SIGOPS Operating Systems Review
High-Speed, Low-Complexity Systolic Designs of Novel Iterative Division Algorithms in GF(2^m)
IEEE Transactions on Computers
Security and Trust Issues in Ubiquitous Environments -- The Business-to-Employee Dimension
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
Emerging challenges in designing secure mobile appliances
Ambient intelligence
An approach to analyzing availability properties of security protocols
Nordic Journal of Computing
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
A security scheme for protecting security policies in firewall
ACM SIGOPS Operating Systems Review
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Information Security on the Logistical Network: An End-to-End Approach
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
Computer Networks: The International Journal of Computer and Telecommunications Networking
Total recall: are privacy changes inevitable?
Proceedings of the the 1st ACM workshop on Continuous archival and retrieval of personal experiences
Adaptive Security for Low Data Rate Networks
Wireless Personal Communications: An International Journal
A configurable cryptography subsystem in a middleware framework for embedded systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A hardware version of the RSA using the Montgomery's algorithm with systolic arrays
Integration, the VLSI Journal
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
An Information Visualization Framework for Intrusion Detection
CHI '04 Extended Abstracts on Human Factors in Computing Systems
Composite signature based watermarking for fingerprint authentication
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Enhancing security through hardware-assisted run-time validation of program data properties
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
SECA: security-enhanced communication architecture
Proceedings of the 2005 international conference on Compilers, architectures and synthesis for embedded systems
RFID security without extensive cryptography
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Speech encoding and encryption in VLSI
ASP-DAC '03 Proceedings of the 2003 Asia and South Pacific Design Automation Conference
Teaching a web security course to practice information assurance
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Scalable and secure data collection using bistro
dg.o '02 Proceedings of the 2002 annual national conference on Digital government research
Anti-vamming trust enforcement in peer-to-peer VoIP networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications
The Journal of Supercomputing
A cryptography core tolerant to DFA fault attacks
SBCCI '06 Proceedings of the 19th annual symposium on Integrated circuits and systems design
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Cryptographic relational algebra for databases using the field authenticator
Computers & Mathematics with Applications
A Graph-Based Unified Technique for Computing and Representing Coefficients over Finite Fields
IEEE Transactions on Computers
IEEE Transactions on Computers
Performance study of Byzantine Agreement Protocol with artificial neural network
Information Sciences: an International Journal
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
Key management for secure multicast over IPv6 wireless networks
EURASIP Journal on Wireless Communications and Networking
Privacy and Anonymity Protection with Blind Threshold Signatures
International Journal of Electronic Commerce
International Journal of High Performance Computing and Networking
Using mobile ad hoc networks to acquire digital evidence from remote autonomous agents
International Journal of Security and Networks
End-to-end security mechanisms for SMS
International Journal of Security and Networks
Secure information systems engineering: a manifesto
International Journal of Electronic Security and Digital Forensics
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks
Computer Communications
A distributed speaker authentication system
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Trust Modeling with Context Representation and Generalized Identities
CIA '07 Proceedings of the 11th international workshop on Cooperative Information Agents XI
The Banknote Anti-forgery System Based on Digital Signature Algorithms
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
Speaker recognition techniques for remote authentication of users in computer networks
WSEAS TRANSACTIONS on SYSTEMS
Towards the development of privacy-aware systems
Information and Software Technology
Information Sciences: an International Journal
A Privacy-Protecting Business-Analytics Service for On-Line Transactions
International Journal of Electronic Commerce
Efficient Authentication and Authorization Infrastructure for Mobile Users
Advanced Web and NetworkTechnologies, and Applications
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
Journal of Parallel and Distributed Computing
Design of a Passport Anti-forgery System Based on Digital Signature Schemes
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Mean Value Analysis for a Class of PEPA Models
EPEW '09 Proceedings of the 6th European Performance Engineering Workshop on Computer Performance Engineering
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A new hardware efficient stream cipher based on hash functions
International Journal of Communication Networks and Distributed Systems
Xor-Implications and E-Implications: Classes of Fuzzy Implications Based on Fuzzy Xor
Electronic Notes in Theoretical Computer Science (ENTCS)
Efficient authentication protocols of GSM
Computer Communications
A note on efficient implementation of prime generation algorithms in small portable devices
Computer Networks: The International Journal of Computer and Telecommunications Networking
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
Providing integrity and authenticity in DICOM images: a novel approach
IEEE Transactions on Information Technology in Biomedicine - Special section on biomedical informatics
A practical anonymous off-line multi-authority payment scheme
Electronic Commerce Research and Applications
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Distributed secret on the basis of the linear correcting codes
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
A fragile watermarking scheme based on SVD for web pages
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Journal of Systems Architecture: the EUROMICRO Journal
Integrating security and systems engineering: towards the modelling of secure information systems
CAiSE'03 Proceedings of the 15th international conference on Advanced information systems engineering
Improved client authentication using session authentication in the internet
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
Efficient user authentication and key agreement in wireless sensor networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
SoftwarePot: an encapsulated transferable file system for secure software circulation
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Foundations of security analysis and design IV
Modified AES using chaotic key generator for satellite imagery encryption
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
Efficient solutions of a PEPA model of a key distribution centre
Performance Evaluation
Chaos-based secure satellite imagery cryptosystem
Computers & Mathematics with Applications
Sensor networks with secure public-key over GF (2m)
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Preventing illegal usage of mobile phone software
COMPSAC-W'05 Proceedings of the 29th annual international conference on Computer software and applications conference
Introducing cryptography course in computer science undergraduate curricula
Proceedings of the 48th Annual Southeast Regional Conference
Quotation authentication: a new approach and efficient solutions by cascaded hashing techniques
IEEE Transactions on Information Forensics and Security
Hamiltonian graph approach to steganography
International Journal of Electronic Security and Digital Forensics
A digital watermarking scheme for personal image authentication using eigenface
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Smart devices for next generation mobile services
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Security agent model using interactive authentication database
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Client authentication model using duplicated authentication server systems
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
Security and trust requirements engineering
Foundations of Security Analysis and Design III
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
A cryptographic solution for general access control
ISC'05 Proceedings of the 8th international conference on Information Security
Abstraction for privacy in context-aware environments
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Information Sciences: an International Journal
Feature: Virtual Private Network Security
Network Security
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
Fundamenta Informaticae
Dual Function Seal: Visualized Digital Signature for Electronic Medical Record Systems
Journal of Medical Systems
A key revocation scheme for mobile sensor networks
ISPA'07 Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking
Hiding Message in Map Along Pre-Hamiltonian Path
International Journal of Information Security and Privacy
An efficient fragile web pages watermarking for integrity protection of XML documents
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.01 |