The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Lightweight Self-Organizing Frameworks for Metacomputing
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Securing Wireless Networks in a University Environment
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Lost in Translation: Theory and Practice in Cryptography
IEEE Security and Privacy
Secure WWW transactions using standard HTTP and Java applets
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
An analysis of conformance issues in implementations of standardized security protocols
Computer Standards & Interfaces
Policy framework for security and privacy management
IBM Journal of Research and Development
On the security of PPPoE network
Security and Communication Networks
Hi-index | 0.00 |