A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A new family of authentication protocols
ACM SIGOPS Operating Systems Review
Transactional Security for a Distributed Reputation Management System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Authenticated Diffie-Hellman Key Agreement Protocols
SAC '98 Proceedings of the Selected Areas in Cryptography
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Provably secure chipcard personalization, or, how to fool malicious insiders
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Establishing the genuinity of remote computer systems
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Establishing identity without certification authorities
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Spontaneous mobile device authentication based on sensor data
Information Security Tech. Report
Proximity-based authentication of mobile devices
International Journal of Security and Networks
Authenticating ubiquitous services: a study of wireless hotspot access
Proceedings of the 11th international conference on Ubiquitous computing
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Computer Communications
Discrete logarithm based protocols
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Shake well before use: authentication based on accelerometer data
PERVASIVE'07 Proceedings of the 5th international conference on Pervasive computing
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Amigo: proximity-based authentication of mobile devices
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
The candidate key protocol for generating secret shared keys from similar sensor data streams
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Visualizing your key for secure phone calls and language independence
Proceedings of the Seventh International Symposium on Visualization for Cyber Security
Public key distribution scheme for delay tolerant networks based on two-channel cryptography
Journal of Network and Computer Applications
A protocol for secure public instant messaging
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Hi-index | 48.22 |