Communications of the ACM
Communications of the ACM
Electronic Data Interchange
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Liability and Computer Security: Nine Principles
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Can We Eliminate Certificate Revocations Lists?
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Compliance defects in public-key cryptography
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
There is a scale between authentication and anonymity, which is currently leaning towards the side of authentication, when it comes to e-commerce. Service providers and merchants are usually keeping track of user-related information in order to construct ...