For want of a bit the user was lost: cheap user modeling
IBM Systems Journal
Communications of the ACM
Technologies for repository interoperation and access control
Proceedings of the third ACM conference on Digital libraries
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
ACM-SE 37 Proceedings of the 37th annual Southeast regional conference (CD-ROM)
Tolerating penetrations and insider attacks by requiring independent corroboration
Proceedings of the 1998 workshop on New security paradigms
Security and Authentication with Digital Signatures
Linux Journal
A public-key based secure mobile IP
Wireless Networks
Trust: benefits, models, and mechanisms
Secure Internet programming
Internet security attacks at the basic levels
ACM SIGOPS Operating Systems Review
Information leakage from optical emanations
ACM Transactions on Information and System Security (TISSEC)
Trust: A Collision of Paradigms
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG
ISC '02 Proceedings of the 5th International Conference on Information Security
Payment technologies for E-commerce
Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Secure Prolog-based mobile code
Theory and Practice of Logic Programming
Efficient, Self-Contained Handling of Identity in Peer-to-Peer Systems
IEEE Transactions on Knowledge and Data Engineering
Engineering human trust in mobile system collaborations
Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering
Fundamental Nonmodularity in Electronic Mail
Automated Software Engineering
Infrastructure: A Prerequisite for Effective Security
LISA '98 Proceedings of the 12th USENIX conference on System administration
LISA '01 Proceedings of the 15th USENIX conference on System administration
Security evaluation of email encryption using random noise generated by LCG
Journal of Computing Sciences in Colleges
How to make secure email easier to use
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Encyclopedia of Computer Science
EURASIP Journal on Wireless Communications and Networking
An authentication method for interaction between personal servers based on the exchange of addresses
Proceedings of the 2005 workshop on Digital identity management
Enabling email confidentiality through the use of opportunistic encryption
dg.o '03 Proceedings of the 2003 annual national conference on Digital government research
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
TinkerNet: a low-cost and ready-to-deploy networking laboratory platform
ACE '06 Proceedings of the 8th Australasian Conference on Computing Education - Volume 52
Designing trustworthy interorganizational trade procedures for open electronic commerce
International Journal of Electronic Commerce - Special issue: A global perspective on electronic commerce
Computers in Biology and Medicine
A chosen ciphertext attack against several e-mail encryption protocols
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
PGP in constrained wireless devices
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
SLIC: an extensibility system for commodity operating systems
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Customization and flexibility in the exmh mail user interface
TCLTK '98 Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3
On securing real-time speech transmission over the internet: an experimental study
EURASIP Journal on Applied Signal Processing
Designing secure e-commerce with role-based access control
International Journal of Web Engineering and Technology
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Service sharing with trust in pervasive environment: now it's time to break the jinx
Proceedings of the 2008 ACM symposium on Applied computing
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
Computer Communications
A scalable authentication model based on public keys
Journal of Network and Computer Applications
Implementing ReGreT in a Decentralized Multi-agent Environment
MATES '07 Proceedings of the 5th German conference on Multiagent System Technologies
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks
Information Security and Cryptology
SecGRID: model for maintaining trust in large-scale dynamic environments
International Journal of Grid and Utility Computing
A new scalable distributed authentication for P2P network and its performance evaluation
WSEAS Transactions on Computers
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
A new scalable distributed authentication for P2P network and its performance evaluation
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
JXTA resource access control by means of advertisement encryption
Future Generation Computer Systems
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Flexible and secure service discovery in ubiquitous computing
Journal of Network and Computer Applications
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
AHSEN: autonomic healing-based self management engine for network management in hybrid networks
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
A smart card based distributed identity management infrastructure for mobile ad hoc networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Split-and-delegate: threshold cryptography for the masses
FC'02 Proceedings of the 6th international conference on Financial cryptography
Security requirements analysis for large-scale distributed file systems
Euro-Par'06 Proceedings of the CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics conference on Parallel processing
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
An effective crypto-biometric system for secure email in wireless environment
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
Gypsy: a component-based mobile agent system
EURO-PDP'00 Proceedings of the 8th Euromicro conference on Parallel and distributed processing
XML-based security for JXTA core protocols
International Journal of Autonomic Computing
Re-Socializing Online Social Networks
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Trust establishment in ad hoc and sensor networks
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Trust-based route selection in dynamic source routing
iTrust'06 Proceedings of the 4th international conference on Trust Management
New attacks against reduced-round versions of IDEA
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Managing trust in distributed agent systems
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Smart devices for next generation mobile services
CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Overview the key management in ad hoc networks
ISSADS'05 Proceedings of the 5th international conference on Advanced Distributed Systems
Faster variants of the MESH block ciphers
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
An implementation and evaluation of online disk encryption for windows systems
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Privacy policies and national culture on the internet
Information Systems Frontiers
Sometimes it's better to be STUCK! SAML transportation unit for cryptographic keys
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Information dependability in distributed systems: The dependable distributed storage system
Integrated Computer-Aided Engineering
Hi-index | 0.02 |
From the Publisher:Use of the Internet is expanding beyond anyone's expectations.As corporations, government offices, and ordinary citizensbegin to rely on the information highway to conduct business,they are realizing how important it is to protect theircommunications -- both to keep them a secret from pryingeyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this.PGP, which stands for Pretty Good Privacy, is a free and widely available encryption program that lets you protect files and electronic mail. Written by Phil Zimmermann and released in 1991, PGP works on virtually every platform and has become very popular both in the U.S. and abroad. Because it usesstate-of-the-art public key cryptography, PGP can be used toauthenticate messages, as well as keep them secret. With PGP,you can digitally "sign" a message when you send it. Bychecking the digital signature at the other end, the recipientcan be sure that the message was not changed duringtransmission and that the message actually came from you.PGP offers a popular alternative to U.S. government initiatives likethe Clipper Chip because, unlike Clipper, it does not allow the government or any other outside agency access to your secret keys.PGP: Pretty Good Privacy by Simson Garfinkel is both a readabletechnical user's guide and a fascinating behind-the-scenes lookat cryptography and privacy. Part I, "PGP Overview," introduces PGP andthe cryptography that underlies it. Part II, "Cryptography History andPolicy," describes the history of PGP -- its personalities, legalbattles, and other intrigues; it also provides background on the battlesover public key cryptography patents and the U.S. government exportrestrictions, and other aspects of the ongoing public debates aboutprivacy and free speech. Part III, "Using PGP," describes how to usePGP: protecting files and email, creating and using keys, signingmessages, certifying and distributing keys, and using key servers.Part IV, "Appendices," describes how to obtain PGP from Internet sites,how to install it on PCs, UNIX systems, and the Macintosh, and otherbackground information. The book also contains a glossary, abibliography, and a handy reference card that summarizes all of the PGPcommands, environment variables, and configuration variables.