Computers at risk: safe computing in the information age
Computers at risk: safe computing in the information age
The cleanroom approach to quality software development
The cleanroom approach to quality software development
The Z notation: a reference manual
The Z notation: a reference manual
Rules of encounter: designing conventions for automated negotiation among computers
Rules of encounter: designing conventions for automated negotiation among computers
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Computer - Special issue: neural computing: companion issue to Spring 1996 IEEE Computational Science & Engineering
Mathematical Notation in Formal Specification: Too Difficult for the Masses?
IEEE Transactions on Software Engineering
What is a secret—and—what does that have to do with computer security?
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
Communications of the ACM
'TSUPDOOD?: Repackaged problems for you and MMI
NSPW '95 Proceedings of the 1995 workshop on New security paradigms
Unhelpfulness as a security policy: or it's about time
NSPW '95 Proceedings of the 1995 workshop on New security paradigms
NSPW '95 Proceedings of the 1995 workshop on New security paradigms
Z: An Introduction to Formal Methods
Z: An Introduction to Formal Methods
The Science of Programming
IEEE Software
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Java Security: From HotJava to Netscape and Beyond
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
A tentative approach to constructing tamper-resistant software
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Discussion topic: what is the old security paradigm?
Proceedings of the 1998 workshop on New security paradigms
Survivability—a new technical and business perspective on security
Proceedings of the 1999 workshop on New security paradigms
Optimistic security: a new access control paradigm
Proceedings of the 1999 workshop on New security paradigms
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
Survivability: Protecting Your Critical Systems
IEEE Internet Computing
Agents in E-commerce: state of the art
Knowledge and Information Systems
Infrastructure Issues and Themes for Scalable Multi-Agent Systems
Revised Papers from the International Workshop on Infrastructure for Multi-Agent Systems: Infrastructure for Agents, Multi-Agent Systems, and Scalable Multi-Agent Systems
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
Root Kits: an operating systems viewpoint
ACM SIGOPS Operating Systems Review
A platform independent approach for mobile agents to monitor network vulnerabilities
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Distributed agent architecture for packet filtering & monitoring in networked computers
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
An abstract interface for cyber-defense mechanisms
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
Airports for agents: an open MAS infrastructure for mobile agents
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
Benefits of Location-Based Access Control: A Literature Study
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Information Security Tech. Report
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems
Proceedings of the 2012 workshop on New security paradigms
On thinging things and serving services: technological mediation and inseparable goods
Ethics and Information Technology
Hi-index | 0.00 |