The official PGP user's guide
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security defects in CCITT recommendation X.509: the directory authentication framework
ACM SIGCOMM Computer Communication Review
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Access and Integrity Control in a Public-Access, High-Assurance Configuration Management System
Proceedings of the 11th USENIX Security Symposium
Versatile padding schemes for joint signature and encryption
Proceedings of the 11th ACM conference on Computer and communications security
Scalable security and accounting services for content-based publish/subscribe systems
Proceedings of the 2005 ACM symposium on Applied computing
Securing the drop-box architecture for assisted living
Proceedings of the fourth ACM workshop on Formal methods in security
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
A novel client-based approach for signing and checking web forms by using XML against DoS attacks
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Ciphire mail email encryption and authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Hi-index | 0.00 |