Ethernet: distributed packet switching for local computer networks
Communications of the ACM - Special 25th Anniversary Issue
On the security of multiple encryption
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Encryption-based protection for interactive user/computer communication
SIGCOMM '77 Proceedings of the fifth symposium on Data communications
Presentation and major design aspects of the CYCLADES computer network
DATACOMM '73 Proceedings of the third ACM symposium on Data communications and Data networks: Analysis and design
Message Authentication with Manipulation Detection Code
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS
NON-DISCRETIONARY ACCESS CONTROL FOR DECENTRALIZED COMPUTING SYSTEMS
Modeling of encryption techniques for secrecy and privacy in multi-user networks
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Secrecy and privacy in the local area network environment
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Remote pipes and procedures for efficient distributed communication
ACM Transactions on Computer Systems (TOCS)
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Comments on “security problems in the TCP/IP protocol suite”
ACM SIGCOMM Computer Communication Review
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Reducing risks from poorly chosen keys
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
UNIX security in a supercomputing environment
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
Construction of internet for Japanese academic communities
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
ACM Transactions on Computer Systems (TOCS)
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
The use of encryption in Kerberos for network authentication (invited)
CRYPTO '89 Proceedings on Advances in cryptology
Authentication in distributed systems: theory and practice
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Security services in the OSI reference model
ACM SIGSAC Review
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
Integration of security in network routing protocols
ACM SIGSAC Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Protocol service decomposition for high-performance networking
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
A protocol for route establishment and packet forwarding across multidomain internets
IEEE/ACM Transactions on Networking (TON)
How to securely replicate services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Multicast security and its extension to a mobile environment
Wireless Networks
A security model for dynamic adaptive traffic masking
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
A security analysis of VAX VMS
ACM '85 Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective
A secure distributed capability based system (extended abstract)
ACM '85 Proceedings of the 1985 ACM annual conference on The range of computing : mid-80's perspective: mid-80's perspective
The ITC distributed file system: principles and design
Proceedings of the tenth ACM symposium on Operating systems principles
Security and privacy requirements in computing
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
Communication security in a distributed network
ACM SIGSAC Review
ACM SIGOPS Operating Systems Review
Handbook of wireless networks and mobile computing
Mobile Networking Through Mobile IP
IEEE Internet Computing
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Multilateral Security: Enabling Technologies and Their Evaluation
Informatics - 10 Years Back. 10 Years Ahead.
A High-Throughput Secure Reliable Multicast Protocol
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A privilege management and enforcement system for distributed resource sharing
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Confidentiality-Preserving Refinement
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Journal of Computing Sciences in Colleges
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Proceedings of the 11th workshop on ACM SIGOPS European workshop
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Analysis of the SSL 3.0 protocol
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Development of E-Learning Design Criteria with Secure Realization Concepts
ISSEP '08 Proceedings of the 3rd international conference on Informatics in Secondary Schools - Evolution and Perspectives: Informatics Education - Supporting Computational Thinking
An overview of computer security
IBM Systems Journal
A novel H.264 SVC encryption scheme for secure bit-rate transcoding
PCS'09 Proceedings of the 27th conference on Picture Coding Symposium
Dependability metrics
A fault tolerance approach to computer viruses
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
An axiomatic basis of trust in distributed systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Multilateral security: enabling technologies and their evaluation
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Empirical and theoretical evaluation of active probing attacks and their countermeasures
IH'04 Proceedings of the 6th international conference on Information Hiding
Secure initialization vector transmission on IP security
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Language modeling and encryption on packet switched networks
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Formally-Based black-box monitoring of security protocols
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Towards a secure data stream management system
TEAA'05 Proceedings of the 31st VLDB conference on Trends in Enterprise Application Architecture
Secure end-to-end delegations in distributed systems
Computer Communications
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
On the design of secure ATM networks
Computer Communications
Hi-index | 0.00 |