On some cryptographic solutions for access control in a tree hierarchy
ACM '87 Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow
Zero-knowledge proofs of identity and veracity of transaction receipts
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
CRYPTO '89 Proceedings on Advances in cryptology
On the encipherment of search trees and random access files
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
ACM Computing Surveys (CSUR)
Third Generation Computer Systems
ACM Computing Surveys (CSUR)
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Recovery Techniques for Database Systems
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Some Aspects of High-Level Microprogramming
ACM Computing Surveys (CSUR)
Password authentication with insecure communication
Communications of the ACM
Password security: a case history
Communications of the ACM
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
Communications of the ACM
A user authentication scheme not requiring secrecy in the computer
Communications of the ACM
A high security log-in procedure
Communications of the ACM
TENEX, a paged time sharing system for the PDP - 10
Communications of the ACM
A computer science course program for small colleges
Communications of the ACM
A component model for stardardized web-based education
Proceedings of the 10th international conference on World Wide Web
Later Developments at Cambridge: Titan, Cap, and the Cambridge Ring
IEEE Annals of the History of Computing
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
ACM SIGOPS Operating Systems Review
A proposal for certain process management and intercommunication primitives
ACM SIGOPS Operating Systems Review
The cost of using the CAP computer's protection facilities
ACM SIGOPS Operating Systems Review
Easy entry: the password encryption problem
ACM SIGOPS Operating Systems Review
Hardware support for memory protection: Capability implementations
ASPLOS I Proceedings of the first international symposium on Architectural support for programming languages and operating systems
Some cryptographic principles of authentication in electronic funds transfer systems
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
ICSE '78 Proceedings of the 3rd international conference on Software engineering
Some Open Problems In Cryptography
ACM '78 Proceedings of the 1978 annual conference
A modular simulation of TSS/360
Proceedings of the fourth annual conference on Applications of simulation
Computer science education in small colleges - a report with recommendations
SIGUCCS '72 Proceedings of the annual ACM SIGUCCS symposium on The administration and management of small-college computing centers
ACM '75 Proceedings of the 1975 annual conference
Principles of computer system organization
SIGCSE '70 Proceedings of the first SIGCSE technical symposium on Education in computer science
Principles of computer system organization
ACM SIGCSE Bulletin
ACM SIGMIS Database
On improvements to password security
ACM SIGOPS Operating Systems Review
Easily remembered passphrases: a better approach
ACM SIGSAC Review - Resources: part II
Encyclopedia of Computer Science
eBPSM: a new security paradigm for e-business organisations (e-business process security model)
Proceedings of the ninth international conference on Electronic commerce
Slave Memories and Segmentation
IEEE Transactions on Computers
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Operating systems principles and undergraduate computer science curricula
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Protection systems and protection implementations
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
The use of passwords for controlling access to remote computer systems and services
AFIPS '77 Proceedings of the June 13-16, 1977, national computer conference
Administrative control of computing service
IBM Systems Journal
A novel adaptive proxy certificates management scheme in military grid environment
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Experimental evidence of application of direct and inverse operators in complex processes
Pattern Recognition and Image Analysis
Usability of display-equipped RFID tags for security purposes
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Operating systems principles and undergraduate computer science curricula
ACM SIGMIS Database
ACM SIGMIS Database
Can Jannie verify? Usability of display-equipped RFID tags for security purposes
Journal of Computer Security - Research in Computer Security and Privacy: Emerging Trends
Hi-index | 0.14 |