Computer Communication Networks: Approaches, Objectives, and Performance Considerations
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Secure communications over insecure channels
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A note on the confinement problem
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
The Design and Analysis of Computer Algorithms
The Design and Analysis of Computer Algorithms
Design Issues for Secure Computer Networks
Operating Systems, An Advanced Course
ACM SIGOPS Operating Systems Review
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
Constructing verified and reliable communications processing systems
ACM SIGSOFT Software Engineering Notes
A Butler process for resource sharing on Spice machines
ACM Transactions on Information Systems (TOIS)
Communications of the ACM
Query optimization using the concept of restricted topologies
ACM SIGSMALL/PC Notes
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
Abuses in cryptography and how to fight them
CRYPTO '88 Proceedings on Advances in cryptology
Network security via private-key certificates
ACM SIGOPS Operating Systems Review
Communications of the ACM
Copy detection mechanisms for digital documents
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
Building a scalable and accurate copy detection mechanism
Proceedings of the first ACM international conference on Digital libraries
CHECK: a document plagiarism detection system
SAC '97 Proceedings of the 1997 ACM symposium on Applied computing
ACM Computing Surveys (CSUR)
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Timestamps in key distribution protocols
Communications of the ACM
Authentication of signatures using public key encryption
Communications of the ACM
Watermarking of Electronic Text Documents
Electronic Commerce Research
Query processing in a distributed data base
SIGSMALL '83 Proceedings of the 1983 ACM SIGSMALL symposium on Personal and small computers
Teaching secure communication protocols using a game representation
ACE '03 Proceedings of the fifth Australasian conference on Computing education - Volume 20
A systematic approach for encryption and authentication with fault tolerance
Computer Networks: The International Journal of Computer and Telecommunications Networking
Identifier protection in a distributed operating system
ACM SIGOPS Operating Systems Review
A Dual-Method Model for Copy Detection
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
The implementation of a cryptography-based secure office system
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Secure Software Engineering: Learning from the Past to Address Future Challenges
Information Security Journal: A Global Perspective
An overview of computer security
IBM Systems Journal
Securing traceability of ciphertexts: towards a secure software key escrow system
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Algorithms and theory of computation handbook
Secure random number generation in wireless sensor networks
Proceedings of the 4th international conference on Security of information and networks
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Hi-index | 0.06 |