On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A framework for distributed authorization
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
An efficient and secure authentication protocol using uncertified keys
ACM SIGOPS Operating Systems Review
Untraceability in mobile networks
MobiCom '95 Proceedings of the 1st annual international conference on Mobile computing and networking
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
IBM wireless RF LAN design and architecture
IBM Systems Journal
Is your computing environment secure?: security problems with interrupt handling mechanisms
ACM SIGOPS Operating Systems Review
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secure Internet programming
A User Authentication Scheme with Identity and Location Privacy
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Entity Authentication and Key Distribution
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Lessons Learned in Implementing and Deploying Crypto Software
Proceedings of the 11th USENIX Security Symposium
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
A resilient access control scheme for secure electronic transactions
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Computer Standards & Interfaces
Highly Efficient Password-Based Three-Party Key Exchange in Random Oracle Model
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Ubiquitous authorization scheme based on device profile
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
SUALPPA scheme: enhanced solution for user authentication in the GSM system
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Hi-index | 0.00 |