Proxy-based security protocols in networked mobile devices
Proceedings of the 2002 ACM symposium on Applied computing
Defending against redirect attacks in mobile IP
Proceedings of the 9th ACM conference on Computer and communications security
IEEE Internet Computing
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
AEGIS: architecture for tamper-evident and tamper-resistant processing
ICS '03 Proceedings of the 17th annual international conference on Supercomputing
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks
Wireless Personal Communications: An International Journal
ACM Transactions on Information and System Security (TISSEC)
Performance evaluation of public key-based authentication in future mobile communication systems
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
PKI-based secure mobile access to electronic health services and data
Technology and Health Care
Routing optimization security in mobile IPv6
Computer Networks: The International Journal of Computer and Telecommunications Networking
OACerts: Oblivious Attribute Certificates
IEEE Transactions on Dependable and Secure Computing
Visual detection of LSB-encoded natural image steganography
ACM Transactions on Applied Perception (TAP)
Improving the cyber security of SCADA communication networks
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
Efficient in-network adaptation of encrypted H.264/SVC content
Image Communication
Browser interfaces and extended validation SSL certificates: an empirical study
Proceedings of the 2009 ACM workshop on Cloud computing security
International Journal of Networking and Virtual Organisations
Design and implementation of a public key-based group collaboration system
Computer Communications
A tool-supported method for the design and implementation of secure distributed applications
ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
Analysis and countermeasures of security vulnerability on portal sites
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
ACCENT: Cognitive cryptography plugged compression for SSL/TLS-based cloud computing services
ACM Transactions on Internet Technology (TOIT)
Formal network packet processing with minimal fuss: invertible syntax descriptions at work
PLPV '12 Proceedings of the sixth workshop on Programming languages meets program verification
Delayed-key message authentication for streams
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
OACerts: oblivious attribute certificates
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Hash function combiners in TLS and SSL
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Authorization and trust enhanced security for distributed applications
ICISS'05 Proceedings of the First international conference on Information Systems Security
Beyond TOR: the truenyms protocol
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Proceedings of the CUBE International Information Technology Conference
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
A security pattern for data integrity in P2P systems
Proceedings of the 17th Conference on Pattern Languages of Programs
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Hi-index | 0.00 |