IEEE Internet Computing
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Security and usability engineering with particular attention to electronic mail
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Usage control platformization via trustworthy SELinux
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Modeling and analysis of security trade-offs - A goal oriented approach
Data & Knowledge Engineering
Securing RFID Systems by Detecting Tag Cloning
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Conceptual Modeling: Foundations and Applications
Securing credit card transactions with one-time payment scheme
Electronic Commerce Research and Applications
A goal oriented approach for modeling and analyzing security trade-offs
ER'07 Proceedings of the 26th international conference on Conceptual modeling
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Following Einstein's idea that "everything should be made as simple as possible, but not simpler," the first installment of IC's new security track explores some of the fundamental changes the future demands of security practice and research. Among the key issues: creating less intrusive practices and looking to real-world examples of good-enough systems to learn from.