On the Reliability of Electronic Payment Systems
IEEE Transactions on Software Engineering
Proceedings of the 4th ACM conference on Computer and communications security
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Certificate based PKI and B2B E-commerce: suitable match or not?
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Applications of Trusted Review to Information Security
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Merx: Secure and Privacy Preserving Delegated Payments
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
ACM SIGCAS Computers and Society
Cryptographic key reliable lifetimes: bounding the risk of key exposure in the presence of faults
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Point-and-shoot security design: can we build better tools for developers?
Proceedings of the 2012 workshop on New security paradigms
Security economics: a personal perspective
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |