Path independence for authentication in large-scale systems
Proceedings of the 4th ACM conference on Computer and communications security
Resilient Authentication Using Path Independence
IEEE Transactions on Computers
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Trust: benefits, models, and mechanisms
Secure Internet programming
Attack-resistant trust metrics for public key certification
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Vulnerability analysis of certificate graphs
International Journal of Security and Networks
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Using web service enhancements to bridge business trust relationships
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Using probabilistic argumentation for key validation in public-key cryptography
International Journal of Approximate Reasoning
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Hi-index | 0.00 |