An End-to-End Authentication Protocol in Wireless Application Protocol
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Re-dividing Complexity between Algorithms and Keys
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Authorization Methods for E-Commerce Applications
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Current security management & Ethical issues of information technology
Delivering Attribute Certificates over GPRS
Proceedings of the 2004 ACM symposium on Applied computing
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Support of subscribers' certificates in a hybrid WLAN-3G environment
Computer Networks: The International Journal of Computer and Telecommunications Networking
MICROCAST: smart card based (micro)pay-per-view for multicast services
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Content-based organisation of virtual repositories of DICOM objects
Future Generation Computer Systems
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Client authentication model using duplicated authentication server systems
AIS'04 Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
Hi-index | 0.00 |